Sciweavers

10263 search results - page 2032 / 2053
» From Use Cases to System Operation Specifications
Sort
View
DRM
2007
Springer
14 years 2 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
SRDS
2006
IEEE
14 years 2 months ago
MOve: Design of An Application-Malleable Overlay
Peer-to-peer overlays allow distributed applications to work in a wide-area, scalable, and fault-tolerant manner. However, most structured and unstructured overlays present in lit...
Sébastien Monnet, Ramsés Morales, Ga...
ACCV
2006
Springer
14 years 2 months ago
A Multiscale Co-linearity Statistic Based Approach to Robust Background Modeling
Background subtraction is an essential task in several static camera based computer vision systems. Background modeling is often challenged by spatio-temporal changes occurring due...
Prithwijit Guha, Dibyendu Palai, K. S. Venkatesh, ...
ISPAN
2005
IEEE
14 years 2 months ago
Process Scheduling for the Parallel Desktop
Commodity hardware and software are growing increasingly more complex, with advances such as chip heterogeneity and specialization, deeper memory hierarchies, ne-grained power ma...
Eitan Frachtenberg
SIGCOMM
2005
ACM
14 years 2 months ago
Improving accuracy in end-to-end packet loss measurement
Measurement and estimation of packet loss characteristics are challenging due to the relatively rare occurrence and typically short duration of packet loss episodes. While active ...
Joel Sommers, Paul Barford, Nick G. Duffield, Amos...
« Prev « First page 2032 / 2053 Last » Next »