Sciweavers

777 search results - page 128 / 156
» presence 2010
Sort
View
TDSC
2010
119views more  TDSC 2010»
14 years 7 months ago
On the General Applicability of Instruction-Set Randomization
We describe Instruction-Set Randomization (ISR), a general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoffs' principle to creat...
Stephen W. Boyd, Gaurav S. Kc, Michael E. Locasto,...
TIFS
2010
143views more  TIFS 2010»
14 years 7 months ago
Face verification across age progression using discriminative methods
Face verification in the presence of age progression is an important problem that has not been widely addressed. In this paper, we study the problem by designing and evaluating dis...
Haibin Ling, Stefano Soatto, Narayanan Ramanathan,...
121
Voted
TIP
2010
161views more  TIP 2010»
14 years 7 months ago
Automatic Parameter Selection for Denoising Algorithms Using a No-Reference Measure of Image Content
Across the field of inverse problems in image and video processing, nearly all algorithms have various parameters which need to be set in order to yield good results. In practice, ...
Xiang Zhu, Peyman Milanfar
TKDE
2010
393views more  TKDE 2010»
14 years 7 months ago
Adaptive Join Operators for Result Rate Optimization on Streaming Inputs
Adaptive join algorithms have recently attracted a lot of attention in emerging applications where data is provided by autonomous data sources through heterogeneous network environ...
Mihaela A. Bornea, Vasilis Vassalos, Yannis Kotidi...
TON
2010
189views more  TON 2010»
14 years 7 months ago
Analysis, Simulation, and Implementation of VCP: A Wireless Profiling
Abstract--Every congestion control protocol operating in wireless networks is potentially faced with two major challenges of performance degradation. These sources are (a) the coup...
Xiaolong Li, Homayoun Yousefi'zadeh