Sciweavers

732 search results - page 71 / 147
» Strongly Non-U-Shaped Learning Results by General Techniques
Sort
View
DSN
2007
IEEE
14 years 2 months ago
Protecting Cryptographic Keys from Memory Disclosure Attacks
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that ...
Keith Harrison, Shouhuai Xu
APCHI
1998
IEEE
14 years 3 hour ago
The Design of Banking Websites: Lessons from Iterative Design
Iterative design is usually considered in the context of prototyping, evaluating, and improving a single product. We had the interesting opportunity to work on three distinct prod...
Tom Brinck, Darren Gergle
TOG
2010
106views more  TOG 2010»
13 years 2 months ago
Accelerating spatially varying Gaussian filters
High-dimensional Gaussian filters, most notably the bilateral filter, are important tools for many computer graphics and vision tasks. In recent years, a number of techniques for ...
Jongmin Baek, David E. Jacobs
WAOA
2005
Springer
112views Algorithms» more  WAOA 2005»
14 years 1 months ago
Partial Multicuts in Trees
Let T = (V, E) be an undirected tree, in which each edge is associated with a non-negative cost, and let {s1, t1}, . . . , {sk, tk} be a collection of k distinct pairs of vertices...
Asaf Levin, Danny Segev
DATE
2010
IEEE
139views Hardware» more  DATE 2010»
14 years 25 days ago
Constant-time admission control for Deadline Monotonic tasks
—The admission control problem is concerned with determining whether a new task may be accepted by a system consisting of a set of running tasks, such that the already admitted a...
Alejandro Masrur, Samarjit Chakraborty, Georg F&au...