Sciweavers

1056 search results - page 40 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
VEE
2012
ACM
226views Virtualization» more  VEE 2012»
12 years 3 months ago
Protecting applications against TOCTTOU races by user-space caching of file metadata
Time Of Check To Time Of Use (TOCTTOU) race conditions for file accesses in user-space applications are a common problem in Unix-like systems. The mapping between filename and i...
Mathias Payer, Thomas R. Gross
INFOCOM
2012
IEEE
11 years 10 months ago
Location privacy preservation in collaborative spectrum sensing
—Collaborative spectrum sensing has been regarded as a promising approach to enable secondary users to detect primary users by exploiting spatial diversity. In this paper, we con...
Shuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Ka...
BMCBI
2007
126views more  BMCBI 2007»
13 years 7 months ago
High-throughput identification of interacting protein-protein binding sites
Background: With the advent of increasing sequence and structural data, a number of methods have been proposed to locate putative protein binding sites from protein surfaces. Ther...
Jo-Lan Chung, Wei Wang, Philip E. Bourne
ICIP
2006
IEEE
14 years 9 months ago
Motion Blur Identification Based on Differently Exposed Images
In this paper we introduce a new method of motion blur identification that relies on the availability of two, differently exposed, image shots of the same scene. The proposed appr...
Marius Tico, Mejdi Trimeche, Markku Vehvilainen
ICPR
2006
IEEE
14 years 8 months ago
Contour Encoding Based on Extraction of Key Points Using Wavelet Transform
In many situations it is convenient to represent pictorial data in the form of contours. It may become necessary to compress such contour data for efficient storage and transmissi...
Pravas Mahapatra, Vishnu Makkapati