Sciweavers

2532 search results - page 19 / 507
» Implementation and applications of the distortion operator
Sort
View
ASPLOS
2008
ACM
13 years 9 months ago
Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, and consequently, frequently prone to compromise. To address this limitation, ...
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis,...
CVPR
2011
IEEE
13 years 4 months ago
Importance Filtering for Image Retargeting
Content-aware image retargeting has attracted a lot of interests recently. The key and most challenging issue for this task is how to balance the tradeoff between preserving the i...
Yuanyuan Ding, Jing Xiao
SIGMOD
2005
ACM
220views Database» more  SIGMOD 2005»
14 years 7 months ago
Sampling Algorithms in a Stream Operator
Complex queries over high speed data streams often need to rely on approximations to keep up with their input. The research community has developed a rich literature on approximat...
Theodore Johnson, S. Muthukrishnan, Irina Rozenbau...
OSDI
1994
ACM
13 years 9 months ago
A Caching Model of Operating System Kernel Functionality
Operating system research has endeavored to develop micro-kernels that provide modularity, reliability and security improvements over conventional monolithic kernels. However, the...
David R. Cheriton, Kenneth J. Duda
IPPS
1998
IEEE
13 years 12 months ago
A Topology Based Approach to Coordinated Multicast Operations
Multicasts are a powerful means to implement coordinated operations on distributed data-sets as well as synchronized reductions of multiple computed results. In this paper we prese...
Jörg Nolte