Sciweavers

625 search results - page 109 / 125
» Optimal resource allocation for security in reliability syst...
Sort
View
GECCO
2007
Springer
149views Optimization» more  GECCO 2007»
14 years 1 months ago
Division blocks and the open-ended evolution of development, form, and behavior
We present a new framework for artificial life involving physically simulated, three-dimensional blocks called Division Blocks. Division Blocks can grow and shrink, divide and fo...
Lee Spector, Jon Klein, Mark Feinstein
WWW
2007
ACM
14 years 8 months ago
Is high-quality vod feasible using P2P swarming?
Peer-to-peer technologies are increasingly becoming the medium of choice for delivering media content, both professional and homegrown, to large user populations. Indeed, current ...
Siddhartha Annapureddy, Saikat Guha, Christos Gkan...
PRL
2007
287views more  PRL 2007»
13 years 6 months ago
2D and 3D face recognition: A survey
Government agencies are investing a considerable amount of resources into improving security systems as result of recent terrorist events that dangerously exposed flaws and weakn...
Andrea F. Abate, Michele Nappi, Daniel Riccio, Gab...
EUROSYS
2010
ACM
14 years 14 days ago
Defeating return-oriented rootkits with "Return-Less" kernels
Targeting the operating system (OS) kernels, kernel rootkits pose a formidable threat to computer systems and their users. Recent efforts have made significant progress in blocki...
Jinku Li, Zhi Wang, Xuxian Jiang, Michael C. Grace...
ICMCS
2006
IEEE
371views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Automatic Counting of Interacting People by using a Single Uncalibrated Camera
Automatic counting of people, entering or exiting a region of interest, is very important for both business and security applications. This paper introduces an automatic and robus...
Senem Velipasalar, Ying-li Tian, Arun Hampapur