Sciweavers

477 search results - page 46 / 96
» Removing even crossings
Sort
View
OSDI
2002
ACM
14 years 9 months ago
ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay
Current system loggers have two problems: they depend on the integrity of the operating system being logged, and they do not save sufficient information to replay and analyze atta...
George W. Dunlap, Samuel T. King, Sukru Cinar, Mur...
ICASSP
2009
IEEE
14 years 3 months ago
Low bitrate audio coding using generalized adaptive gain shape vector quantization across channels
Audio coding at low bitrates suffers from artifacts due to spectrum truncation. Typical audio codecs code multi-channel sources using transforms across the channels to remove redu...
Sanjeev Mehrotra, Wei-Ge Chen, Kishore A. Kotteri
APCSAC
2007
IEEE
14 years 3 months ago
Implicit Transactional Memory in Kilo-Instruction Multiprocessors
Although they have been the main server technology for many years, multiprocessors are undergoing a renaissance due to multi-core chips and the attractive scalability properties of...
Marco Galluzzi, Enrique Vallejo, Adrián Cri...
CIKM
2007
Springer
14 years 3 months ago
"I know what you did last summer": query logs and user privacy
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins
INFOCOM
2006
IEEE
14 years 2 months ago
On Hybrid Collision Control for IEEE 802.11 Ad-Hoc Networks
— We present in this work a new mechanism based on an innovative hybrid approach for traffic and collision control in wireless ad hoc networks. We combine the well known equatio...
Hicham Khalife