Sciweavers

15375 search results - page 26 / 3075
» cans 2008
Sort
View
ASPLOS
2008
ACM
13 years 9 months ago
How low can you go?: recommendations for hardware-supported minimal TCB code execution
We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
ECAI
2008
Springer
13 years 9 months ago
Can URML Model Successfully Drools Rules?
The use of rules in business modeling is becoming more and more important, in applications requiring dynamic change of behavior. A number of rule languages and tools have been prop...
Emilian Pascalau, Adrian Giurca
CVPR
2008
IEEE
14 years 9 months ago
What can missing correspondences tell us about 3D structure and motion?
Practically all existing approaches to structure and motion computation use only positive image correspondences to verify the camera pose hypotheses. Incorrect epipolar geometries...
Christopher Zach, Arnold Irschara, Horst Bischof
EDBT
2008
ACM
160views Database» more  EDBT 2008»
14 years 7 months ago
Why go logarithmic if we can go linear?: Towards effective distinct counting of search traffic
Estimating the number of distinct elements in a large multiset has several applications, and hence has attracted active research in the past two decades. Several sampling and sket...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
COLCOM
2008
IEEE
14 years 2 months ago
Collaborative Search and User Privacy: How Can They Be Reconciled?
Abstract. Collaborative search engines (CSE) let users pool their resources and share their experiences when seeking information on the web. However, when shared, search terms and ...
Thorben Burghardt, Erik Buchmann, Klemens Böh...