Sciweavers

833 search results - page 136 / 167
» mc 2007
Sort
View
ICISS
2007
Springer
14 years 1 months ago
Towards Automated Privilege Separation
Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to pro...
Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew ...
ANCS
2007
ACM
13 years 11 months ago
Experimenting with buffer sizes in routers
Recent theoretical results in buffer sizing research suggest that core Internet routers can achieve high link utilization, if they are capable of storing only a handful of packets...
Neda Beheshti, Jad Naous, Yashar Ganjali, Nick McK...
WSC
2007
13 years 10 months ago
Using event simulation to evaluate internet protocol enhancements for special services
Disasters can cause extraordinary service demand by the public, while concurrently causing outages that reduce network capacity to serve the surging demand. It is imperative that ...
David A. Garbin, Patrick V. McGregor, Denise M. Be...
CVPR
2007
IEEE
14 years 9 months ago
Joint Real-time Object Detection and Pose Estimation Using Probabilistic Boosting Network
In this paper, we present a learning procedure called probabilistic boosting network (PBN) for joint real-time object detection and pose estimation. Grounded on the law of total p...
Jingdan Zhang, Shaohua Kevin Zhou, Leonard McMilla...
CVPR
2008
IEEE
14 years 9 months ago
A discriminatively trained, multiscale, deformable part model
This paper describes a discriminatively trained, multiscale, deformable part model for object detection. Our system achieves a two-fold improvement in average precision over the b...
Pedro F. Felzenszwalb, David A. McAllester, Deva R...