Sciweavers

64 search results - page 13 / 13
» Dynamic cost-per-action mechanisms and applications to onlin...
Sort
View
EUROSYS
2008
ACM
14 years 5 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...
FCCM
1999
IEEE
134views VLSI» more  FCCM 1999»
14 years 9 days ago
Runlength Compression Techniques for FPGA Configurations
The time it takes to reconfigure FPGAs can be a significant overhead for reconfigurable computing. In this paper we develop new compression algorithms for FPGA configurations that...
Scott Hauck, William D. Wilson
CVPR
2006
IEEE
14 years 10 months ago
Robust Visual Tracking Using Case-Based Reasoning with Confidence
The paper describes a simple but robust framework for visual object tracking in a video sequence. Compared with the existing tracking techniques, our proposed tracking technique h...
Zhiwei Zhu, Wenhui Liao, Qiang Ji
WWW
2004
ACM
14 years 8 months ago
A method for transparent admission control and request scheduling in e-commerce web sites
This paper presents a method for admission control and request scheduling for multiply-tiered e-commerce Web sites, achieving both stable behavior during overload and improved res...
Sameh Elnikety, Erich M. Nahum, John M. Tracey, Wi...