Sciweavers

5344 search results - page 80 / 1069
» Privacy-Preserving Set Operations
Sort
View
ICPR
2008
IEEE
14 years 11 months ago
Learning invariant region descriptor operators with genetic programming and the F-measure
Recognizing and localizing objects is a classical problem in computer vision that is an important stage for many automated systems. In order to perform object recognition many res...
Cynthia B. Pérez, Gustavo Olague
SOSP
2007
ACM
14 years 7 months ago
Secure virtual architecture: a safe execution environment for commodity operating systems
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach...
John Criswell, Andrew Lenharth, Dinakar Dhurjati, ...
VTC
2008
IEEE
126views Communications» more  VTC 2008»
14 years 4 months ago
On the Impact of Coarse Synchronization on the Performance of Broadcast/Multicast Single Frequency Network Operation in WCDMA
Abstract—We evaluate the system-level performance and potential capacity gain of MBSFN (Multicast/Broadcast Single Frequency Network) operation in Wideband CDMA (WCDMA) and compa...
Christoph A. Jotten, Christian Sgraja, Josef J. Bl...
ICDE
2007
IEEE
106views Database» more  ICDE 2007»
14 years 4 months ago
Mining Trajectory Databases via a Suite of Distance Operators
With the rapid progress of mobile devices and positioning technologies, Trajectory Databases (TD) have been in the core of database research during the last decade. Analysis and k...
Nikos Pelekis, Ioannis Kopanakis, Irene Ntoutsi, G...
WORDS
2005
IEEE
14 years 3 months ago
Functional and Non-Functional Properties in a Family of Embedded Operating Systems
The increasing complexity of embedded systems calls for software design and implementation techniques that support specialization without abandonment of reusability. This brings u...
Daniel Lohmann, Wolfgang Schröder-Preikschat,...