Sciweavers

3675 search results - page 715 / 735
» Support Vector Tracking
Sort
View
116
Voted
ASPLOS
2010
ACM
15 years 9 months ago
Request behavior variations
A large number of user requests execute (often concurrently) within a server system. A single request may exhibit fluctuating hardware characteristics (such as instruction comple...
Kai Shen
107
Voted
IDTRUST
2009
ACM
15 years 9 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
128
Voted
WCRE
2009
IEEE
15 years 9 months ago
FAMOOSr 2009 - Workshop on FAMIX and Moose in Software Reengineering
The increasing amount of data available about software systems poses new challenges for re- and reverse engineering research, as the proposed approaches need to scale. In this con...
Simon Denier, Tudor Gîrba
128
Voted
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
15 years 8 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...
133
Voted
OTM
2009
Springer
15 years 8 months ago
Ontology-Driven Provenance Management in eScience: An Application in Parasite Research
Provenance, from the French word “provenir”, describes the lineage or history of a data entity. Provenance is critical information in scientific applications to verify experime...
Satya Sanket Sahoo, D. Brent Weatherly, Raghava Mu...