Sciweavers

343 search results - page 36 / 69
» Finding latent performance bugs in systems implementations
Sort
View
AUIC
2005
IEEE
14 years 1 months ago
Hand Tracking For Low Powered Mobile AR User Interfaces
Mobile augmented reality systems use general purpose computing hardware to perform tasks such as rendering computer graphics, providing video overlay, and performing vision tracki...
Ross Smith, Wayne Piekarski, Grant B. Wigley
OSDI
2006
ACM
14 years 8 months ago
Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable
In current commodity systems, applications have no way of limiting their trust in the underlying operating system (OS), leaving them at the complete mercy of an attacker who gains...
Richard Ta-Min, Lionel Litty, David Lie
EXPERT
2002
146views more  EXPERT 2002»
13 years 7 months ago
The Frame-Based Module of the SUISEKI Information Extraction System
names in the same abstract already indicates a relation between them. Because of its simplicity, we can apply this approach to large amounts of text and establish interaction netwo...
Christian Blaschke, Alfonso Valencia
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
13 years 8 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries
LFP
1992
140views more  LFP 1992»
13 years 9 months ago
Global Tagging Optimization by Type Inference
Tag handling accounts for a substantial amount of execution cost in latently typed languages such as Common LISP and Scheme, especially on architectures that provide no special ha...
Fritz Henglein