Sciweavers

257 search results - page 43 / 52
» Breaking Value Symmetry
Sort
View
ECOOP
2009
Springer
14 years 8 months ago
Checking Framework Interactions with Relationships
Software frameworks impose constraints on how plugins may interact with them. Many of hese constraints involve multiple objects, are temporal, and depend on runtime values. Additi...
Ciera Jaspan, Jonathan Aldrich
CSFW
2007
IEEE
14 years 1 months ago
Probability of Error in Information-Hiding Protocols
Randomized protocols for hiding private information can often be regarded as noisy channels in the informationtheoretic sense, and the inference of the concealed information can b...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
JSSPP
2007
Springer
14 years 1 months ago
Group-Wise Performance Evaluation of Processor Co-allocation in Multi-cluster Systems
Performance evaluation in multi-cluster processor co-allocation - like in many other parallel job scheduling problems- is mostly done by computing the average metric value for the ...
John Ngubiri, Mario van Vliet
ICCV
2005
IEEE
14 years 1 months ago
Resolving Hand over Face Occlusion
Abstract. This paper presents a method to segment the hand over complex backgrounds, such as the face. The similar colors and texture of the hand and face make the problem particul...
Paul Smith, Niels da Vitoria Lobo, Mubarak Shah
PADS
2005
ACM
14 years 1 months ago
Software Diversity as a Defense against Viral Propagation: Models and Simulations
The use of software diversity has often been discussed in the research literature as an effective means to break up the software monoculture present on the Internet and to thus p...
Adam J. O'Donnell, Harish Sethu