Sciweavers

250 search results - page 11 / 50
» Lost source provenance
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor
We present the sHype hypervisor security architecture and examine in detail its mandatory access control facilities. While existing hypervisor security approaches aiming at high a...
Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ra...
HCI
2009
13 years 5 months ago
An Open Source Framework for Real-Time, Incremental, Static and Dynamic Hand Gesture Learning and Recognition
Real-time, static and dynamic hand gesture learning and recognition makes it possible to have computers recognize hand gestures naturally. This creates endless possibilities in the...
Todd C. Alexander, Hassan S. Ahmed, Georgios C. An...

Publication
165views
15 years 6 months ago
A Timeout Based Congestion Control Scheme for Window Flow- Controlled Networks
During overload, most networks drop packets due to buffer unavailability. The resulting timeouts at the source provide an implicit mechanism to convey congestion signals from the n...
R. Jain
IJMSO
2006
105views more  IJMSO 2006»
13 years 7 months ago
Trust network-based filtering of aggregated claims
: On the semantic web, assertions may be aggregated from many sources, those aggregations filtered, reasoned over, aggregated with other aggregators, displayed, scraped, extracted,...
Jennifer Golbeck, Bijan Parsia
MM
2006
ACM
166views Multimedia» more  MM 2006»
14 years 1 months ago
Video retargeting: automating pan and scan
When a video is displayed on a smaller display than originally intended, some of the information in the video is necessarily lost. In this paper, we introduce Video Retargeting th...
Feng Liu, Michael Gleicher