Sciweavers

871 search results - page 72 / 175
» Data Recovery from Distributed Personal Repositories
Sort
View
CVIU
2008
151views more  CVIU 2008»
13 years 10 months ago
Accurate and precise 2D-3D registration based on X-ray intensity
This paper addresses the problem of estimating the 3D rigid pose of an object from its digitized X-ray projection. We considered the cases of homogeneous (CAD models) and inhomoge...
Souha Aouadi, Laurent Sarry
SOSP
2001
ACM
14 years 7 months ago
Resilient Overlay Networks
A Resilient Overlay Network (RON) is an architecture that allows distributed Internet applications to detect and recover from path outages and periods of degraded performance with...
David G. Andersen, Hari Balakrishnan, M. Frans Kaa...
CCS
2008
ACM
14 years 4 days ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
CONEXT
2009
ACM
13 years 11 months ago
Virtually eliminating router bugs
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semant...
Eric Keller, Minlan Yu, Matthew Caesar, Jennifer R...
SIGCOMM
2006
ACM
14 years 4 months ago
A measurement study on the impact of routing events on end-to-end internet path performance
Extensive measurement studies have shown that end-to-end Internet path performance degradation is correlated with routing dynamics. However, the root cause of the correlation betw...
Feng Wang, Zhuoqing Morley Mao, Jia Wang, Lixin Ga...