Sciweavers

595 search results - page 59 / 119
» An Approach to Adaptive Memory Management in Data Stream Sys...
Sort
View
DIMVA
2011
12 years 11 months ago
Operating System Interface Obfuscation and the Revealing of Hidden Operations
Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
ICIP
2003
IEEE
14 years 9 months ago
A novel cost-distortion optimization framework for video streaming over differentiated services networks
This paperpresentsa novel framework for streamingvideo over a Differentiated Services (DifPjew) network that jointly considers video source coding. packet classification and error...
Fan Zhai, Yiftach Eisenberg, Carlos E. Luna, Thras...
ASPLOS
2008
ACM
13 years 10 months ago
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, and consequently, frequently prone to compromise. To address this limitation, ...
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,...
CEC
2010
IEEE
13 years 9 months ago
An adaptive ensemble of fuzzy ARTMAP neural networks for video-based face classification
A key feature in population based optimization algorithms is the ability to explore a search space and make a decision based on multiple solutions. In this paper, an incremental le...
Jean-François Connolly, Eric Granger, Rober...
DAWAK
2006
Springer
13 years 11 months ago
A Versioning Management Model for Ontology-Based Data Warehouses
More and more integration systems use ontologies to solve the problem of semantic heterogeneities between autonomous databases. To automate the integration process, a number of the...
Dung Nguyen Xuan, Ladjel Bellatreche, Guy Pierra