Sciweavers

403 search results - page 20 / 81
» Plenoptic path and its applications
Sort
View
INFOCOM
2006
IEEE
14 years 1 months ago
How to Select a Good Alternate Path in Large Peer-to-Peer Systems?
Abstract— When multiple paths are available between communicating hosts, application quality can be improved by switching among them to always use the best one. The key to such a...
Teng Fei, Shu Tao, Lixin Gao, Roch Guérin
IFIP
2005
Springer
14 years 1 months ago
Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback
Nearly all network applications rely on the global Internet routing infrastructure to compute routes and deliver packets. Unfortunately, false Internet routes can be maliciously in...
Eunjong Kim, Daniel Massey, Indrajit Ray
USENIX
2004
13 years 9 months ago
Trusted Path Execution for the Linux 2.6 Kernel as a Linux Security Module
The prevention of damage caused to a system via malicious executables is a significant issue in the current state of security on Linux operating systems. Several approaches are av...
Niki A. Rahimi
DEBU
2007
111views more  DEBU 2007»
13 years 7 months ago
Multi-lingual Semantic Matching with OrdPath in Relational Systems
The volume of information in natural languages in electronic format is increasing exponentially. The demographics of users of information management systems are becoming increasin...
A. Kumaran, Peter Carlin
ECCV
2004
Springer
14 years 1 months ago
CT from an Unmodified Standard Fluoroscopy Machine Using a Non-reproducible Path
3D reconstruction from image data is required in many medical procedures. Recently, the use of fluoroscopy data to generate these 3D models has been explored. Most existing methods...
Chris Baker, Christian Debrunner, Mohamed Mahfouz,...