Sciweavers

1047 search results - page 165 / 210
» Searching Without a Heuristic: Efficient Use of Abstraction
Sort
View
HPCA
2007
IEEE
14 years 8 months ago
Concurrent Direct Network Access for Virtual Machine Monitors
This paper presents hardware and software mechanisms to enable concurrent direct network access (CDNA) by operating systems running within a virtual machine monitor. In a conventi...
Jeffrey Shafer, David Carr, Aravind Menon, Scott R...
EDOC
2002
IEEE
14 years 1 months ago
Model-Based Risk Assessment to Improve Enterprise Security
The main objective of the CORAS project is to provide methods and tools for precise, unambiguous, and efficient risk assessment of security critical systems. To this end, we advoc...
Jan Øyvind Aagedal, Folker den Braber, Theo...
ASIACRYPT
2007
Springer
14 years 3 days ago
On Tweaking Luby-Rackoff Blockciphers
Abstract. Tweakable blockciphers, first formalized by Liskov, Rivest, and Wagner [13], are blockciphers with an additional input, the tweak, which allows for variability. An open p...
David Goldenberg, Susan Hohenberger, Moses Liskov,...
TASLP
2008
104views more  TASLP 2008»
13 years 8 months ago
A New Model-Based Algorithm for Optimizing the MPEG-AAC in MS-Stereo
Abstract--In this paper, a new model-based algorithm for optimizing the MPEG-Advanced Audio Coder (AAC) in MS-stereo mode is presented. This algorithm is an extension to stereo sig...
Olivier Derrien, Gaël Richard
TCSV
2008
297views more  TCSV 2008»
13 years 8 months ago
Activity Analysis, Summarization, and Visualization for Indoor Human Activity Monitoring
Abstract--In this work, we study how continuous video monitoring and intelligent video processing can be used in eldercare to assist the independent living of elders and to improve...
Zhongna Zhou, Xi Chen, Yu-Chia Chung, Zhihai He, T...