Scheduled Maintenance Alert:
To start on September 25th @ 9:30 EST, we will be performing a server upgrade. During this time, you may experience brief interruptions in service. We apologize for any inconvenience and appreciate your patience as we work to enhance our platform.
JScholarship will not be available during the upgrade window but which is expected to last for 1 hour but could take much longer.
Browsing Computer Science, Dept. of by Title
Now showing items 1-20 of 30
-
Algorithms for Computing the Center of Area of a Convex Polygon
(Department of Computer Science, The Johns Hopkins University, 1988-10-17) -
Cascading Divide-and-Conquer: A Technique for Designing Parallel Algorithms
(Department of Computer Science, The Johns Hopkins University, 1988) -
Classifying Network Protocol Implementation Versions: An OpenSSL Case Study
(2013-12-11)A new technique is presented for identifying the implementation version number of software that is used for Internet communications. While many programs may exchange version numbers, oftentimes only a small subset of them ... -
Design and Implementation of Views: Isolated Perspectives of a File System
(2010-04-20)We present Views, a file system architecture that provides isolation between system components for the purposes of access control, regulatory compliance, and sandboxing. Views allows for discrete I/O entities, such as ... -
Design and Implementation of Views: Isolated Perspectives of a File System for Regulatory Compliance
(2009-08-24)We present Views, a file system architecture designed to meet the role-based access control (RBAC) requirement of federal regulations, such as those in HIPAA. Views allows for discrete IO entities, such as users, groups or ... -
Efficient Parallel Term Matching
(Department of Computer Science, The Johns Hopkins University, 1988-01) -
Equivariant embeddings in euclidean space
(1957-03) -
Evaluation of Diagonal Confidence-Weighted Learning on the KDD Cup 1999 Dataset for Network Intrusion Detection Systems
(2011-02-03)In this study, I evaluate the performance of diagonal Confidence-Weighted (CW) online linear classification on the KDD Cup 1999 dataset for network intrusion detection systems (NIDS). This is a compatible relationship due ... -
Extensions of representations of lie groups II
(1957-08) -
Families of periodic solutions of systems having relatively invariant line integrals
(The Johns Hopkins University, 1954-06-20) -
iSeeYou: Disabling the MacBook Webcam Indicator LED
(2013-12-11)The ubiquitous webcam indicator LED is an important privacy feature which provides a visual cue that the camera is turned on. We describe how to disable the LED on a class of Apple internal iSight webcams used in some ... -
Locating Faults in a Constant Number of Parallel Testing Rounds (Preliminary Version)
(Department of Computer Science, The Johns Hopkins University, 1989) -
Multi-Object Geodesic Active Contours (MOGAC): A Parallel Sparse-Field Algorithm for Image Segmentation
(2012-02-28)An important task for computer vision systems is to segment adjacent structures in images without producing gaps or overlaps. Multi-object Level Set Methods (MLSM) perform this task with the benefit of sub-pixel accuracy. ... -
A Note on the Computational Complexity of Symmetric Connectionist Networks
(Department of Computer Science, The Johns Hopkins University, 1988-01) -
On a conjecture of Montgomery
(1957-06) -
On existence in the large of solutions of hyperbolic partial differential equations
(The Johns Hopkins University, 1960-07) -
On local and global properties of convex sets and hypersurfaces
(The Johns Hopkins University, 1959-11) -
On the fundamental group of a homogeneous space
(1957-06) -
On the perturbation of a periodic solution when the variational system has non-trivial periodic solutions
(The Johns Hopkins University, 1955-01-20)