Sciweavers

563 search results - page 87 / 113
» Verifiable Signature Sharing
Sort
View
OOPSLA
2010
Springer
14 years 9 months ago
Composable specifications for structured shared-memory communication
In this paper we propose a communication-centric approach to specifying and checking how multithreaded programs use shared memory to perform inter-thread communication. Our approa...
Benjamin P. Wood, Adrian Sampson, Luis Ceze, Dan G...
CVPR
2009
IEEE
16 years 7 months ago
Boosted Multi-Task Learning for Face Verification With Applications to Web Image and Video Search
Face verification has many potential applications including filtering and ranking image/video search results on celebrities. Since these images/videos are taken under uncontrolle...
Xiaogang Wang (MIT), Cha Zhang (Microsoft Research...
MOBISYS
2007
ACM
15 years 11 months ago
Addressing security in medical sensor networks
We identify the security challenges facing a sensor network for wireless health monitoring, and propose an architecture called "SNAP" (Sensor Network for Assessment of P...
Kriangsiri Malasri, Lan Wang
LATA
2009
Springer
15 years 6 months ago
Counting Parameterized Border Arrays for a Binary Alphabet
The parameterized pattern matching problem is a kind of pattern matching problem, where a pattern is considered to occur in a text when there exists a renaming bijection on the alp...
Tomohiro I, Shunsuke Inenaga, Hideo Bannai, Masayu...
GLOBECOM
2008
IEEE
15 years 6 months ago
Transport of Long-Range Dependent Traffic in Single-Hop and Multi-Hop IEEE 802.11e Networks
 Long-range dependence (LRD) is a widely verified property of traffic crossing the wireless LAN radio interface. LRD severely affects network performance yielding longer queuing...
Stefano Bregni, Paolo Giacomazzi, Gabriella Saddem...