Sciweavers

2421 search results - page 459 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
IPTPS
2005
Springer
14 years 3 months ago
Evaluating DHT-Based Service Placement for Stream-Based Overlays
Stream-based overlay networks (SBONs) are one approach to implementing large-scale stream processing systems. A fundamental consideration in an SBON is that of service placement, ...
Peter R. Pietzuch, Jeffrey Shneidman, Jonathan Led...
LISA
2007
14 years 5 days ago
Inferring Higher Level Policies from Firewall Rules
Packet filtering firewall is one of the most important mechanisms used by corporations to enforce their security policy. Recent years have seen a lot of research in the area of ...
Alok Tongaonkar, Niranjan Inamdar, R. Sekar
DAGSTUHL
2010
13 years 11 months ago
Generalized Hyper-cylinders: a Mechanism for Modeling and Visualizing N-D Objects
The display of surfaces and solids has usually been restricted to the domain of scientific visualization; however, little work has been done on the visualization of surfaces and s...
Matthew O. Ward, Zhenyu Guo
ICPR
2010
IEEE
13 years 7 months ago
Patch-Based Similarity HMMs for Face Recognition with a Single Reference Image
In this paper we present a new architecture for face recognition with a single reference image, which completely separates the training process from the recognition process. In th...
Ngoc-Son Vu, Alice Caplier
POPL
2011
ACM
13 years 20 days ago
Making prophecies with decision predicates
We describe a new algorithm for proving temporal properties expressed in LTL of infinite-state programs. Our approach takes advantage of the fact that LTL properties can often be...
Byron Cook, Eric Koskinen