نتایج جستجو برای: we considered

تعداد نتایج: 4761271  

Journal: :Communications of the ACM 2016

Journal: :Information Services & Use 2013

Journal: :Perspectives on Science 2014

Journal: :The Journal of the Anthropological Institute of Great Britain and Ireland 1875

2005
Marc E. Fiuczynski Robert Grimm Yvonne Coady David Walker

Linux is increasingly used to power everything from embedded devices to supercomputers. Developers of such systems often start with a mainline kernel from kernel.org and then apply patches for their application domain. Many of these patches represent crosscutting concerns in that they do not fit within a single program module and are scattered throughout the kernel sources—easily affecting over...

Journal: :CoRR 2015
Riad S. Wahby Sebastian Angel Max Howald Joshua B. Leners Andrew J. Blumberg Michael Walfish

Attacks on host computers by malicious peripherals are a growing problem; the inexorable advance of powerful, small, cheap peripherals, which attach to plug-and-play buses, has made such attacks easy to mount. At the same time, commodity operating systems lack systematic defenses. We present Cinch, a pragmatic response to this threat. Cinch transforms USB peripherals to untrusted network endpoi...

1999
Berthold K.P. Horn

Methods based on projective geometry have become popular in machine vision because they lead to elegant mathematics, and easy-to-solve linear equations [Longuett-Higgins 81, Hartley 97a, Quan & Lan 99]. It is often not realized that one pays a heavy price for this. Such method do not correctly model the physics of image formation and as a result require more correspondences and are considerably...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید