Sciweavers

563 search results - page 87 / 113
» Verifiable Signature Sharing
Sort
View
OOPSLA
2010
Springer
13 years 6 months ago
Composable specifications for structured shared-memory communication
In this paper we propose a communication-centric approach to specifying and checking how multithreaded programs use shared memory to perform inter-thread communication. Our approa...
Benjamin P. Wood, Adrian Sampson, Luis Ceze, Dan G...
CVPR
2009
IEEE
15 years 4 months ago
Boosted Multi-Task Learning for Face Verification With Applications to Web Image and Video Search
Face verification has many potential applications including filtering and ranking image/video search results on celebrities. Since these images/videos are taken under uncontrolle...
Xiaogang Wang (MIT), Cha Zhang (Microsoft Research...
MOBISYS
2007
ACM
14 years 8 months ago
Addressing security in medical sensor networks
We identify the security challenges facing a sensor network for wireless health monitoring, and propose an architecture called "SNAP" (Sensor Network for Assessment of P...
Kriangsiri Malasri, Lan Wang
LATA
2009
Springer
14 years 3 months ago
Counting Parameterized Border Arrays for a Binary Alphabet
The parameterized pattern matching problem is a kind of pattern matching problem, where a pattern is considered to occur in a text when there exists a renaming bijection on the alp...
Tomohiro I, Shunsuke Inenaga, Hideo Bannai, Masayu...
GLOBECOM
2008
IEEE
14 years 3 months ago
Transport of Long-Range Dependent Traffic in Single-Hop and Multi-Hop IEEE 802.11e Networks
 Long-range dependence (LRD) is a widely verified property of traffic crossing the wireless LAN radio interface. LRD severely affects network performance yielding longer queuing...
Stefano Bregni, Paolo Giacomazzi, Gabriella Saddem...