Sciweavers

24188 search results - page 4741 / 4838
» Computing on Encrypted Data
Sort
View
TRUST
2010
Springer
15 years 9 months ago
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
Abstract. Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted o...
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-P...
COMPSAC
2002
IEEE
15 years 9 months ago
An Approach to Identify Duplicated Web Pages
A relevant consequence of the unceasing expansion of the Web and e-commerce is the growth of the demand of new Web sites and Web applications. The software industry is facing the ...
Giuseppe A. Di Lucca, Massimiliano Di Penta, Anna ...
HICSS
2002
IEEE
113views Biometrics» more  HICSS 2002»
15 years 9 months ago
Designing and Examining PC to Palm Collaboration
One trend in day-to-day computing involves moving seamlessly from large powerful workstations to small handheld devices. A second trend is continuous collaboration with colleagues...
Ivan Marsic, Allan Meng Krebs, Bogdan Dorohonceanu...
ICARCV
2002
IEEE
109views Robotics» more  ICARCV 2002»
15 years 9 months ago
Quantized wavelet features and support vector machines for on-road vehicle detection
The focus of this work is on the problem of feature selection and classification for on-road vehicle detection. In particular, we propose using quantized Haar wavelet features an...
Zehang Sun, George Bebis, Ronald Miller
ICPP
2002
IEEE
15 years 9 months ago
Software Caching using Dynamic Binary Rewriting for Embedded Devices
A software cache implements instruction and data caching entirely in software. Dynamic binary rewriting offers a means to specialize the software cache miss checks at cache miss t...
Chad Huneycutt, Joshua B. Fryman, Kenneth M. Macke...
« Prev « First page 4741 / 4838 Last » Next »