Sciweavers

5246 search results - page 1008 / 1050
» Sanitization models and their limitations
Sort
View
DATE
2004
IEEE
128views Hardware» more  DATE 2004»
14 years 1 months ago
Enhanced Diameter Bounding via Structural
Bounded model checking (BMC) has gained widespread industrial use due to its relative scalability. Its exhaustiveness over all valid input vectors allows it to expose arbitrarily ...
Jason Baumgartner, Andreas Kuehlmann
CGO
2006
IEEE
14 years 1 months ago
Space-Efficient 64-bit Java Objects through Selective Typed Virtual Addressing
Memory performance is an important design issue for contemporary systems given the ever increasing memory gap. This paper proposes a space-efficient Java object model for reducing...
Kris Venstermans, Lieven Eeckhout, Koen De Bossche...
CIVR
2006
Springer
189views Image Analysis» more  CIVR 2006»
14 years 1 months ago
Automatic Person Annotation of Family Photo Album
Digital photographs are replacing tradition films in our daily life and the quantity is exploding. This stimulates the strong need for efficient management tools, in which the anno...
Ming Zhao 0003, Yong Teo, Siliang Liu, Tat-Seng Ch...
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
14 years 1 months ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner
DCOSS
2006
Springer
14 years 1 months ago
Lifetime Maximization of Sensor Networks Under Connectivity and k-Coverage Constraints
In this paper, we study the fundamental limits of a wireless sensor network's lifetime under connectivity and k-coverage constraints. We consider a wireless sensor network wit...
Wei Mo, Daji Qiao, Zhengdao Wang
« Prev « First page 1008 / 1050 Last » Next »