Sciweavers

9503 search results - page 1885 / 1901
» Authenticated System Calls
Sort
View
RAID
2010
Springer
13 years 9 months ago
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory
Dynamic kernel memory has been a popular target of recent kernel malware due to the difficulty of determining the status of volatile dynamic kernel objects. Some existing approach...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
RAS
2010
136views more  RAS 2010»
13 years 9 months ago
A realistic benchmark for visual indoor place recognition
An important competence for a mobile robot system is the ability to localize and perform context interpretation. This is required to perform basic navigation and to facilitate loc...
Andrzej Pronobis, Barbara Caputo, Patric Jensfelt,...
SIAMSC
2010
215views more  SIAMSC 2010»
13 years 9 months ago
A Fast Algorithm for Sparse Reconstruction Based on Shrinkage, Subspace Optimization, and Continuation
We propose a fast algorithm for solving the ℓ1-regularized minimization problem minx∈Rn µ x 1 + Ax − b 2 2 for recovering sparse solutions to an undetermined system of linea...
Zaiwen Wen, Wotao Yin, Donald Goldfarb, Yin Zhang
SYNTHESE
2010
99views more  SYNTHESE 2010»
13 years 9 months ago
Vagueness, uncertainty and degrees of clarity
The focus of the paper is on the logic of clarity and the problem of higherorder vagueness. We first examine the consequences of the notion of intransitivity of indiscriminabilit...
Paul Égré, Denis Bonnay
TC
2010
13 years 9 months ago
PERFECTORY: A Fault-Tolerant Directory Memory Architecture
—The number of CPUs in chip multiprocessors is growing at the Moore’s Law rate, due to continued technology advances. However, new technologies pose serious reliability challen...
Hyunjin Lee, Sangyeun Cho, Bruce R. Childers
« Prev « First page 1885 / 1901 Last » Next »