Sciweavers

739 search results - page 67 / 148
» Information Flow in Credential Systems
Sort
View
ICCD
2006
IEEE
103views Hardware» more  ICCD 2006»
14 years 4 months ago
Architectural Support for Run-Time Validation of Control Flow Transfer
—Current micro-architecture blindly uses the address in the program counter to fetch and execute instructions without validating its legitimacy. Whenever this blind-folded instru...
Yixin Shi, Sean Dempsey, Gyungho Lee
ICWS
2008
IEEE
13 years 9 months ago
A Temporal Data-Mining Approach for Discovering End-to-End Transaction Flows
Effective management of Web Services systems relies on accurate understanding of end-to-end transaction flows, which may change over time as the service composition evolves. This ...
Ting Wang, Chang-Shing Perng, Tao Tao, Chunqiang T...
HICSS
2005
IEEE
130views Biometrics» more  HICSS 2005»
14 years 1 months ago
Knowledge Flow in Interdisciplinary Teams
Knowledge flow in interdisciplinary teams has become of particular interest as research and alliances cross traditional disciplinary boundaries, and as computing is applied in any...
Caroline Haythornthwaite
ENTCS
2006
113views more  ENTCS 2006»
13 years 7 months ago
The Role of Back-Pressure in Implementing Latency-Insensitive Systems
Back-pressure is a logical mechanism to control the flow of information on a communication channel of a latency-insensitive system (LIS) while guaranteeing that no packet is lost....
Luca P. Carloni
CVPR
2004
IEEE
14 years 9 months ago
Error Analysis for a Navigation Algorithm Based on Optical-Flow and a Digital Terrain Map
This paper deals with the error analysis of a novel navigation algorithm that uses as input the sequence of images acquired from a moving camera and a Digital Terrain (or Elevatio...
Ehud Rivlin, Héctor Rotstein, Ronen Lerner