Sciweavers

346 search results - page 36 / 70
» Can we trust docking results
Sort
View
SISW
2005
IEEE
14 years 1 months ago
File System Design with Assured Delete
This paper describes a system that supports high availability of data, until the data should be expunged, at which time it is impossible to recover the data. This design supports ...
Radia J. Perlman
DATE
2004
IEEE
139views Hardware» more  DATE 2004»
13 years 11 months ago
Flexible Software Protection Using Hardware/Software Codesign Techniques
A strong level of trust in the software running on an embedded processor is a prerequisite for its widespread deployment in any high-risk system. The expanding field of software p...
Joseph Zambreno, Alok N. Choudhary, Rahul Simha, B...
NIPS
2007
13 years 9 months ago
Bayesian Co-Training
We propose a Bayesian undirected graphical model for co-training, or more generally for semi-supervised multi-view learning. This makes explicit the previously unstated assumption...
Shipeng Yu, Balaji Krishnapuram, Rómer Rosa...
BMVC
2000
13 years 9 months ago
Quantifying Ambiguities in Inferring Vector-Based 3D Models
This paper presents a framework for directly addressing issues arising from self-occlusions and ambiguities due to the lack of depth information in vector-based representations. V...
Eng-Jon Ong, Shaogang Gong
CJ
2004
93views more  CJ 2004»
13 years 7 months ago
An Architecture for Kernel-Level Verification of Executables at Run Time
Digital signatures have been proposed by several researchers as a way of preventing execution of malicious code. In this paper we propose a general architecture for performing the...
Luigi Catuogno, Ivan Visconti