Sciweavers

5891 search results - page 1105 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
180
Voted
RTAS
1997
IEEE
15 years 8 months ago
QoS Negotiation in Real-Time Systems and Its Application to Automated Flight Control
ÐReal-time middleware services must guarantee predictable performance under specified load and failure conditions, and ensure graceful degradation when these conditions are violat...
Tarek F. Abdelzaher, Ella M. Atkins, Kang G. Shin
262
Voted
HPCC
2011
Springer
14 years 4 months ago
Achieving Performance and Availability Guarantees with Spot Instances
Abstract—In the Infrastructure-as-a-Service (IaaS) cloud computing market, spot instances refer to virtual servers that are rented via an auction. Spot instances allow IaaS provi...
Michele Mazzucco, Marlon Dumas
ICCV
2005
IEEE
16 years 6 months ago
Vehicle Identification between Non-Overlapping Cameras without Direct Feature Matching
We propose a novel method for identifying road vehicles between two non-overlapping cameras. The problem is formulated as a same-different classification problem: probability of t...
Ying Shan, Harpreet S. Sawhney, Rakesh Kumar
CVPR
2012
IEEE
13 years 7 months ago
Real-time image-based 6-DOF localization in large-scale environments
We present a real-time approach for image-based localization within large scenes that have been reconstructed offline using structure from motion (Sfm). From monocular video, our...
Hyon Lim, Sudipta N. Sinha, Michael F. Cohen, Matt...
144
Voted
HPCA
2007
IEEE
16 years 5 months ago
MemTracker: Efficient and Programmable Support for Memory Access Monitoring and Debugging
Memory bugs are a broad class of bugs that is becoming increasingly common with increasing software complexity, and many of these bugs are also security vulnerabilities. Unfortuna...
Guru Venkataramani, Brandyn Roemer, Yan Solihin, M...
« Prev « First page 1105 / 1179 Last » Next »