Sciweavers

2257 search results - page 21 / 452
» Secure program partitioning
Sort
View
ICMCS
2005
IEEE
99views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Finding the Optimal Temporal Partitioning of Video Sequences
The existing techniques for shot partitioning either process each shot boundary independently or proceed sequentially. The sequential process assumes the last shot boundary is cor...
Ba Tu Truong, Svetha Venkatesh
POPL
2000
ACM
14 years 1 months ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
SAFECOMP
2007
Springer
14 years 2 months ago
A Comparison of Partitioning Operating Systems for Integrated Systems
In present-day electronic systems, application subsystems from different vendors and with different criticality levels are integrated within the same hardware. Hence, encapsulati...
Bernhard Leiner, Martin Schlager, Roman Obermaisse...
CP
2006
Springer
14 years 11 days ago
Global Optimization of Probabilistically Constrained Linear Programs
We consider probabilistic constrained linear programs with general distributions for the uncertain parameters. These problems generally involve non-convex feasible sets. We develo...
Shabbir Ahmed
ICS
2007
Tsinghua U.
14 years 2 months ago
Cooperative cache partitioning for chip multiprocessors
This paper presents Cooperative Cache Partitioning (CCP) to allocate cache resources among threads concurrently running on CMPs. Unlike cache partitioning schemes that use a singl...
Jichuan Chang, Gurindar S. Sohi