Sciweavers

536 search results - page 53 / 108
» Deconstructing process isolation
Sort
View
ACSAC
2005
IEEE
14 years 2 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh
CVPR
2001
IEEE
14 years 10 months ago
Event-Based Analysis of Video
Dynamic events can be regarded as long-term temporal objects, which are characterized by spatio-temporal features at multiple temporal scales. Based on this, we design a simple st...
Lihi Zelnik-Manor, Michal Irani
ICIAP
2005
ACM
14 years 8 months ago
A New Efficient Method for Producing Global Affine Invariants
This paper introduces a new efficient way for computing affine invariant features from gray-scale images. The method is based on a novel image transform which produces infinitely m...
Esa Rahtu, Janne Heikkilä, Mikko Salo
CP
2005
Springer
14 years 2 months ago
Mind the Gaps: A New Splitting Strategy for Consistency Techniques
Classical methods for solving numerical CSPs are based on a branch and prune algorithm, a dichotomic enumeration process interleaved with a consistency filtering algorithm. In man...
Heikel Batnini, Claude Michel, Michel Rueher
ICSE
2004
IEEE-ACM
14 years 8 months ago
Skoll: Distributed Continuous Quality Assurance
Quality assurance (QA) tasks, such as testing, profiling, and performance evaluation, have historically been done in-house on developer-generated workloads and regression suites. ...
Atif M. Memon, Adam A. Porter, Cemal Yilmaz, Adith...