Sciweavers

1620 search results - page 281 / 324
» eg 2010
Sort
View
86
Voted
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
15 years 3 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan
SSIRI
2010
15 years 3 months ago
An Industrial Case Study on Speeding Up User Acceptance Testing by Mining Execution Logs
—Software reliability is defined as the probability of failure-free operation for a period of time, under certain conditions. To determine whether the reliability of an applicat...
Zhen Ming Jiang, Alberto Avritzer, Emad Shihab, Ah...
99
Voted
ICDCS
2010
IEEE
15 years 2 months ago
When Transportation Meets Communication: V2P over VANETs
Abstract—Information interaction is a crucial part of modern transportation activities. In this paper, we propose the idea of Vehicle-to-Passenger communication (V2P), which allo...
Nianbo Liu, Ming Liu, Jiannong Cao, Guihai Chen, W...
SIGIR
2010
ACM
15 years 2 months ago
Entity information management in complex networks
Entity information management (EIM) is a nascent IR research area that investigates the information management process about entities instead of documents. It is motivated by the ...
Yi Fang
CIVR
2010
Springer
427views Image Analysis» more  CIVR 2010»
15 years 2 months ago
An efficient method for face retrieval from large video datasets
The human face is one of the most important objects in videos since it provides rich information for spotting certain people of interest, such as government leaders in news video,...
Thao Ngoc Nguyen, Thanh Duc Ngo, Duy-Dinh Le, Shin...