Sciweavers

1770 search results - page 218 / 354
» Writing requirements in computer security
Sort
View
IACR
2011
101views more  IACR 2011»
12 years 10 months ago
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
Companies, organizations, and individuals often wish to share information to realize valuable social and economic goals. Unfortunately, privacy concerns often stand in the way of ...
Emil Stefanov, Elaine Shi, Dawn Song
SIBGRAPI
1999
IEEE
14 years 2 months ago
Parallelizing MPEG Video Encoding using Multiprocessors
Many computer applications are currently using digital video. Recent advances in digital imaging and faster networking infrastructure made this technology very popular, not only fo...
Joao Paulo Kitajima, Denilson Barbosa, Wagner Meir...
CLUSTER
2009
IEEE
13 years 8 months ago
Design alternatives for implementing fence synchronization in MPI-2 one-sided communication for InfiniBand clusters
Scientific computing has seen an immense growth in recent years. The Message Passing Interface (MPI) has become the de-facto standard for parallel programming model for distribute...
Gopalakrishnan Santhanaraman, Tejus Gangadharappa,...
ICSOC
2007
Springer
14 years 4 months ago
Byzantine Fault Tolerant Coordination for Web Services Atomic Transactions
Abstract. In this paper, we present the mechanisms needed for Byzantine fault tolerant coordination of Web services atomic transactions. The mechanisms have been incorporated into ...
Wenbing Zhao
IROS
2006
IEEE
84views Robotics» more  IROS 2006»
14 years 4 months ago
Vehicle Trajectory from an Uncalibrated Stereo-Rig with Super-Homography
— We present in this article an original manner to estimate the trajectory of a vehicle running in urban-like areas. The method consists in extracting then tracking features (poi...
Nicolas Simond, Claude Laurgeau