Sciweavers

1031 search results - page 41 / 207
» codes 2004
Sort
View
ICPR
2004
IEEE
15 years 11 months ago
Filtering with Gray-Code Kernels
In this paper we introduce a family of filter kernels the Gray-Code Kernels (GCK) and demonstrate their use in image analysis. Filtering an image with a sequence of Gray-Code Kern...
Gil Ben-Artzi, Hagit Hel-Or, Yacov Hel-Or
78
Voted
DSN
2004
IEEE
15 years 1 months ago
A Decentralized Algorithm for Erasure-Coded Virtual Disks
A Federated Array of Bricks is a scalable distributed storage system composed from inexpensive storage bricks. It achieves high reliability with low cost by using erasure coding a...
Svend Frølund, Arif Merchant, Yasushi Saito...
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
15 years 7 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee
SAC
2004
ACM
15 years 3 months ago
Using semi-lagrangian formulations with automatic code generation for environmental modeling
An import issue for numerical weather prediction modes (NWP) is the time it takes to produce a valid forecast. One factor, which greatly influences this simulation time is the si...
Paul van der Mark, Lex Wolters, Gerard Cats
EUSAI
2004
Springer
15 years 3 months ago
Remote Code Execution on Ubiquitous Mobile Applications
Today, most mobile devices (e.g. PDAs) are in some way associated to a fixed personal computer or server. In general this relation is only taken into account for synchronization p...
João Nuno Silva, Paulo Ferreira