Sciweavers

13618 search results - page 2454 / 2724
» The Newton Operating System
Sort
View
VC
2010
122views more  VC 2010»
15 years 3 months ago
Nonhomogeneous scaling optimization for realtime image resizing
We present a novel approach for interactive content-aware image resizing. The resizing is performed on warping a triangular mesh over the image, which captures the image saliency i...
Yong Jin, Ligang Liu, Qingbiao Wu
VIROLOGY
2010
128views more  VIROLOGY 2010»
15 years 3 months ago
Auto-Sign: an automatic signature generator for high-speed malware filtering devices
This research proposes a novel automatic method (termed Auto-Sign) for extracting unique signatures of malware executables to be used by high-speed malware filtering devices based...
Gil Tahan, Chanan Glezer, Yuval Elovici, Lior Roka...
VTC
2010
IEEE
140views Communications» more  VTC 2010»
15 years 3 months ago
Superposition Coding Aided Bi-Directional Relay Transmission Employing Iteratively Decoded Self-Concatenated Convolutional Codes
— In this paper, we consider coding schemes designed for two nodes communicating with each other with the aid of a relay node, which receives information from the two nodes in th...
Muhammad Fasih Uddin Butt, Rong Zhang, Soon Xin Ng...
WDAG
2010
Springer
204views Algorithms» more  WDAG 2010»
15 years 3 months ago
The Cost of Privatization
Software transactional memory (STM) guarantees that a transaction, consisting of a sequence of operations on the memory, appears to be executed atomically. In practice, it is impor...
Hagit Attiya, Eshcar Hillel
145
Voted
WIAS
2010
102views more  WIAS 2010»
15 years 3 months ago
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
Yaoxue Zhang, Laurence Tianruo Yang, Yuezhi Zhou, ...
« Prev « First page 2454 / 2724 Last » Next »