Sciweavers

3101 search results - page 568 / 621
» Using Relational Databases in the Engineering Repository Sys...
Sort
View
116
Voted
CVPR
2010
IEEE
15 years 1 months ago
Nonparametric Label-to-Region by Search
In this work, we investigate how to propagate annotated labels for a given single image from the image-level to their corresponding semantic regions, namely Label-toRegion (L2R), ...
Xiaobai Liu, Shuicheng Yan, Jiebo Luo
ESORICS
2004
Springer
15 years 8 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
158
Voted
CODES
2004
IEEE
15 years 6 months ago
Power analysis of system-level on-chip communication architectures
For complex System-on-chips (SoCs) fabricated in nanometer technologies, the system-level on-chip communication architecture is emerging as a significant source of power consumpti...
Kanishka Lahiri, Anand Raghunathan
127
Voted
WWW
2009
ACM
16 years 3 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang
128
Voted
INFOCOM
2009
IEEE
15 years 9 months ago
A Queueing Model Framework of PCE-Based Inter-Area Path Computation
Abstract—Path computation elements (PCE’s) are used to compute end-to-end paths across multiple areas. Multiple PCE’s may be dedicated to each area to provide sufficient path...
Juanjuan Yu, Yue He, Kai Wu, Marco Tacca, Andrea F...