Sciweavers

261 search results - page 50 / 53
» Alternative Bloat Control Methods
Sort
View
NDSS
2008
IEEE
14 years 1 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
ICRA
2007
IEEE
199views Robotics» more  ICRA 2007»
14 years 1 months ago
Automatic Outlier Detection: A Bayesian Approach
— In order to achieve reliable autonomous control in advanced robotic systems like entertainment robots, assistive robots, humanoid robots and autonomous vehicles, sensory data n...
Jo-Anne Ting, Aaron D'Souza, Stefan Schaal
VISUALIZATION
2005
IEEE
14 years 1 months ago
Particle and Texture Based Spatiotemporal Visualization of Time-Dependent Vector Fields
We propose a hybrid particle and texture based approach for the visualization of time-dependent vector fields. The underlying spacetime framework builds a dense vector field rep...
Daniel Weiskopf, Frederik Schramm, Gordon Erlebach...
ESOP
2005
Springer
14 years 1 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
INFOCOM
2000
IEEE
13 years 12 months ago
Prevention of Deadlocks and Livelocks in Lossless, Backpressured Packet Networks
—When congestion builds up in a packet network, two general approaches are possible to cope with the shortage of buffer space. One approach is to drop incoming packets for which ...
Mark J. Karol, S. Jamaloddin Golestani, David Lee