Sciweavers

833 search results - page 136 / 167
» mc 2007
Sort
View
ICISS
2007
Springer
15 years 3 months ago
Towards Automated Privilege Separation
Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to pro...
Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew ...
ANCS
2007
ACM
15 years 1 months ago
Experimenting with buffer sizes in routers
Recent theoretical results in buffer sizing research suggest that core Internet routers can achieve high link utilization, if they are capable of storing only a handful of packets...
Neda Beheshti, Jad Naous, Yashar Ganjali, Nick McK...
100
Voted
WSC
2007
15 years 5 hour ago
Using event simulation to evaluate internet protocol enhancements for special services
Disasters can cause extraordinary service demand by the public, while concurrently causing outages that reduce network capacity to serve the surging demand. It is imperative that ...
David A. Garbin, Patrick V. McGregor, Denise M. Be...
CVPR
2007
IEEE
15 years 11 months ago
Joint Real-time Object Detection and Pose Estimation Using Probabilistic Boosting Network
In this paper, we present a learning procedure called probabilistic boosting network (PBN) for joint real-time object detection and pose estimation. Grounded on the law of total p...
Jingdan Zhang, Shaohua Kevin Zhou, Leonard McMilla...
CVPR
2008
IEEE
15 years 11 months ago
A discriminatively trained, multiscale, deformable part model
This paper describes a discriminatively trained, multiscale, deformable part model for object detection. Our system achieves a two-fold improvement in average precision over the b...
Pedro F. Felzenszwalb, David A. McAllester, Deva R...