Sciweavers

780 search results - page 109 / 156
» software 2011
Sort
View
MOBISYS
2011
ACM
14 years 14 days ago
TagSense: a smartphone-based approach to automatic image tagging
Mobile phones are becoming the convergent platform for personal sensing, computing, and communication. This paper attempts to exploit this convergence towards the problem of autom...
Chuan Qin, Xuan Bao, Romit Roy Choudhury, Srihari ...
IACR
2011
110views more  IACR 2011»
13 years 9 months ago
On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme
With the gaining popularity of remote storage (e.g. in the Cloud), we consider the setting where a small, protected local machine wishes to access data on a large, untrusted remot...
Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky
IACR
2011
86views more  IACR 2011»
13 years 9 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
CVPR
2011
IEEE
14 years 5 months ago
Glare Encoding of High Dynamic Range Images
Without specialized sensor technology or custom, multichip cameras, high dynamic range imaging typically involves time-sequential capture of multiple photographs. The obvious down...
Mushfiqur Rouf, Rafal Mantiuk, Wolfgang Heidrich, ...
CONSTRAINTS
2011
14 years 4 months ago
Dantzig-Wolfe decomposition and branch-and-price solving in G12
Abstract The G12 project is developing a software environment for stating and solving combinatorial problems by mapping a high-level model of the problem to an efficient combinatio...
Jakob Puchinger, Peter J. Stuckey, Mark G. Wallace...