Sciweavers

536 search results - page 29 / 108
» Deconstructing process isolation
Sort
View
MOBIHOC
2009
ACM
14 years 9 months ago
Characterizing the exit process of a non-saturated IEEE 802.11 wireless network
In this paper, we consider a non-saturated IEEE 802.11 based wireless network. We use a three-way fixed point to model the node behavior with Bernoulli packet arrivals and determi...
Punit Rathod, Onkar Dabeer, Abhay Karandikar, Anir...
FASE
2006
Springer
14 years 9 days ago
: Designing a Scalable Build Process
Modern software codebases are frequently large, heterogeneous, and constantly evolving. The languages and tools for software construction, including code builds and configuration m...
Jason Hickey, Aleksey Nogin
CCS
2007
ACM
14 years 2 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
ICIP
2006
IEEE
14 years 10 months ago
Binary Morphology and Local Statistics Applied to Iris Segmentation for Recognition
One of the first steps in iris recognition is isolating (or segmenting) the iris from an image of the subject's eye area. This paper investigates new approaches for locating ...
Lauren R. Kennell, Robert W. Ives, Ruth M. Gaunt
TSD
1999
Springer
14 years 27 days ago
Classifying Visemes for Automatic Lipreading
Automatic lipreading is automatic speech recognition that uses only visual information. The relevant data in a video signal is isolated and features are extracted from it. From a s...
Michiel Visser, Mannes Poel, Anton Nijholt