Sciweavers

1816 search results - page 347 / 364
» Trace oblivious computation
Sort
View
CCS
2007
ACM
14 years 2 months ago
An inquiry into the nature and causes of the wealth of internet miscreants
This paper studies an active underground economy which specializes in the commoditization of activities such as credit card fraud, identity theft, spamming, phishing, online crede...
Jason Franklin, Adrian Perrig, Vern Paxson, Stefan...
IPSN
2007
Springer
14 years 2 months ago
LaserSPECks: : laser SPECtroscopic trace-gas sensor networks - sensor integration and applications
We introduce a novel laser spectroscopic trace-gas sensor platform, LaserSPECks that integrates recently developed miniature quartz-enhanced photoacoustic spectroscopy (QEPAS) gas...
Stephen So, Farinaz Koushanfar, Anatoliy Kosterev,...
MIDDLEWARE
2007
Springer
14 years 2 months ago
AVMEM - Availability-Aware Overlays for Management Operations in Non-cooperative Distributed Systems
Monitoring and management operations that query nodes based on their availability can be extremely useful in a variety of largescale distributed systems containing hundreds to thou...
Ramsés Morales, Brian Cho, Indranil Gupta
SCALESPACE
2007
Springer
14 years 2 months ago
Piecewise Constant Level Set Method for 3D Image Segmentation
Level set methods have been proven to be efficient tools for tracing interface problems. Recently, some variants of the Osher- Sethian level set methods, which are called the Piece...
Are Losnegård, Oddvar Christiansen, Xue-Chen...
ACISP
2006
Springer
14 years 2 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros