Sciweavers

123 search results - page 24 / 25
» Semantic Encryption Transformation Scheme
Sort
View
VLDB
2007
ACM
122views Database» more  VLDB 2007»
14 years 7 months ago
MIST: Distributed Indexing and Querying in Sensor Networks using Statistical Models
The modeling of high level semantic events from low level sensor signals is important in order to understand distributed phenomena. For such content-modeling purposes, transformat...
Arnab Bhattacharya, Anand Meka, Ambuj K. Singh
ICFP
2005
ACM
14 years 7 months ago
Continuations from generalized stack inspection
Implementing first-class continuations can pose a challenge if the target machine makes no provisions for accessing and re-installing the run-time stack. In this paper, we present...
Greg Pettyjohn, John Clements, Joe Marshall, Shrir...
ICFP
2005
ACM
14 years 1 months ago
Fast narrowing-driven partial evaluation for inductively sequential programs
Narrowing-driven partial evaluation is a powerful technique for the specialization of (first-order) functional and functional logic programs. However, although it gives good resu...
J. Guadalupe Ramos, Josep Silva, Germán Vid...
TCSV
2002
125views more  TCSV 2002»
13 years 7 months ago
Object-based video abstraction for video surveillance systems
ased Video Abstraction for Video Surveillance Systems Changick Kim, Member, IEEE, and Jenq-Neng Hwang, Fellow, IEEE Key frames are the subset of still images which best t the conte...
Changick Kim, Jenq-Neng Hwang
ACSAC
2007
IEEE
14 years 1 months ago
Limits of Static Analysis for Malware Detection
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Andreas Moser, Christopher Kruegel, Engin Kirda