Sciweavers

1316 search results - page 99 / 264
» A Computational Approach to Compare Information Revelation P...
Sort
View
ICPR
2006
IEEE
14 years 10 months ago
Efficient Region Based Indexing and Retrieval for Images with Elastic Bucket Tries
Retrieval and indexing in multimedia databases has been an active topic both in the Information Retrieval and computer vision communities for a long time. In this paper we propose...
C. V. Jawahar, P. Suman Karthik
ICCCN
2008
IEEE
14 years 3 months ago
Improving Load Balancing with Multipath Routing
— Internet service providers have to provision network resources to optimize bandwidth utilization. Dynamic routing protocols take traffic variations into account to control the...
Pascal Mérindol, Jean-Jacques Pansiot, St&e...
AAAI
2008
13 years 11 months ago
Reinforcement Learning for Vulnerability Assessment in Peer-to-Peer Networks
Proactive assessment of computer-network vulnerability to unknown future attacks is an important but unsolved computer security problem where AI techniques have significant impact...
Scott Dejmal, Alan Fern, Thinh Nguyen
PLDI
2012
ACM
11 years 11 months ago
RockSalt: better, faster, stronger SFI for the x86
Software-based fault isolation (SFI), as used in Google’s Native Client (NaCl), relies upon a conceptually simple machine-code analysis to enforce a security policy. But for com...
Greg Morrisett, Gang Tan, Joseph Tassarotti, Jean-...
ICFP
2007
ACM
14 years 9 months ago
Lazy call-by-value evaluation
Designing debugging tools for lazy functional programming languages is a complex task which is often solved by expensive tracing of lazy computations. We present a new approach in...
Bernd Braßel, Frank Huch, Germán Vida...