Sciweavers

503 search results - page 70 / 101
» Equality In Lazy Computation Systems
Sort
View
INFOCOM
2008
IEEE
14 years 3 months ago
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
—We argue that the traditional notion of trust as a relation among entities, while useful, becomes insufficient for emerging data-centric mobile ad hoc networks. In these system...
Maxim Raya, Panagiotis Papadimitratos, Virgil D. G...
FPL
2005
Springer
131views Hardware» more  FPL 2005»
14 years 2 months ago
An Efficient Approach to Hide the Run-Time Reconfiguration from SW Applications
Dynamically reconfigurable logic is becoming an important design unit in SoC system. A method to make the reconfiguration management transparent to software applications is requir...
Yang Qu, Juha-Pekka Soininen, Jari Nurmi
HICSS
2010
IEEE
237views Biometrics» more  HICSS 2010»
14 years 1 months ago
SafeFox: A Safe Lightweight Virtual Browsing Environment
1 The browser has become a popular attack vector for implanting code on computer operating systems. Equally critical, important sessions, such as online banking, must be protected ...
Jiang Wang, Yih Huang, Anup K. Ghosh
DIAGRAMS
2006
Springer
14 years 9 days ago
The Mathematics of Boundaries: A Beginning
The intuitive properties of configurations of planar non-overlapping closed curves (boundaries) are presented as a pure boundary mathematics. The mathematics, which is not incorpor...
William Bricken
PAMI
2011
13 years 3 months ago
Linearized Motion Estimation for Articulated Planes
—In this paper, we describe the explicit application of articulation constraints for estimating the motion of a system of articulated planes. We relate articulations to the relat...
Ankur Datta, Yaser Sheikh, Takeo Kanade