Sciweavers

298 search results - page 55 / 60
» Computer security: quality rather than quantity
Sort
View
ISCA
2010
IEEE
192views Hardware» more  ISCA 2010»
14 years 1 months ago
NoHype: virtualized cloud infrastructure without the virtualization
Cloud computing is a disruptive trend that is changing the way we use computers. The key underlying technology in cloud infrastructures is virtualization – so much so that many ...
Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby ...
JMM2
2007
96views more  JMM2 2007»
13 years 8 months ago
Software Watermarking Resilient to Debugging Attacks
Abstract— In 2006, Gaurav Gupta and Josef Pieprzyk presented an attack on the branch-based software watermarking scheme proposed by Ginger Myles and Hongxia Jin in 2005. The softw...
Gaurav Gupta, Josef Pieprzyk
ICCV
2003
IEEE
14 years 10 months ago
Facial Expression Decomposition
In this paper, we propose a novel approach for facial expression decomposition - Higher-Order Singular Value Decomposition (HOSVD), a natural generalization of matrix SVD. We lear...
Hongcheng Wang, Narendra Ahuja
PSIVT
2007
Springer
203views Multimedia» more  PSIVT 2007»
14 years 2 months ago
Direct Ellipse Fitting and Measuring Based on Shape Boundaries
: Measuring ellipticity is an important area of computer vision systems. Most existing ellipticity measures are area based and cannot be easily applied to point sets such as extrac...
Milos Stojmenovic, Amiya Nayak
LCN
2005
IEEE
14 years 2 months ago
Implementation and Performance Analysis of a Packet Scheduler on a Programmable Network Processor
— The problem of achieving fairness in the allocation of the bandwidth resource on a link shared by multiple flows of traffic has been extensively researched over the last deca...
Fariza Sabrina, Salil S. Kanhere, Sanjay Jha