Sciweavers

194 search results - page 25 / 39
» I-RMI: Performance Isolation in Information Flow Application...
Sort
View
DAC
2008
ACM
13 years 9 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
MMS
2007
13 years 7 months ago
Collaborative video searching on a tabletop
Almost all system and application design for multimedia systems is based around a single user working in isolation to perform some task yet much of the work for which we use comput...
Alan F. Smeaton, Hyowon Lee, Colum Foley, Sin&eacu...
HPDC
2002
IEEE
14 years 15 days ago
Predicting Sporadic Grid Data Transfers
The increasingly common practice of replicating datasets and using resources as distributed data stores in Grid environments has led to the problem of determining which replica ca...
Sudharshan Vazhkudai, Jennifer M. Schopf
MOBIHOC
2004
ACM
14 years 7 months ago
Towards mobility as a network control primitive
In the near future, the advent of large-scale networks of mobile agents autonomously performing long-term sensing and communication tasks will be upon us. However, using controlle...
David Kiyoshi Goldenberg, Jie Lin, A. Stephen Mors...
PREMI
2007
Springer
14 years 1 months ago
Self Adaptable Recognizer for Document Image Collections
Abstract. This paper presents an architecture that enables the recognizer to learn incrementally and, thereby adapt to document image collections for performance improvement. We ar...
Million Meshesha, C. V. Jawahar