Sciweavers

1565 search results - page 311 / 313
» An unlikely result
Sort
View
SIGMETRICS
2011
ACM
237views Hardware» more  SIGMETRICS 2011»
12 years 9 months ago
Analysis of DCTCP: stability, convergence, and fairness
Cloud computing, social networking and information networks (for search, news feeds, etc) are driving interest in the deployment of large data centers. TCP is the dominant Layer 3...
Mohammad Alizadeh, Adel Javanmard, Balaji Prabhaka...
IACR
2011
89views more  IACR 2011»
12 years 6 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown
ICDAR
2011
IEEE
12 years 6 months ago
A New Fourier-Moments Based Video Word and Character Extraction Method for Recognition
— This paper presents a new method based on Fourier and moments features to extract words and characters from a video text line in any direction for recognition. Unlike existing ...
Deepak Rajendran, Palaiahnakote Shivakumara, Bolan...
POPL
2012
ACM
12 years 2 months ago
Resource-sensitive synchronization inference by abduction
We present an analysis which takes as its input a sequential program, augmented with annotations indicating potential parallelization opportunities, and a sequential proof, writte...
Matko Botincan, Mike Dodds, Suresh Jagannathan
VEE
2012
ACM
252views Virtualization» more  VEE 2012»
12 years 2 months ago
libdft: practical dynamic data flow tracking for commodity systems
Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they propagate during program execution. DFT has been repeatedly implemented by a variety of ...
Vasileios P. Kemerlis, Georgios Portokalidis, Kang...