Search
Now showing items 1-10 of 77
Muithu: Smaller Footprint, Potentially Larger Imprint
(Research report; Forskningsrapport, 2012)
We describe our experience with the Muithu sports notational analysis system, a novel digital information system in the popular sports domain. The system integrates real-time coach notations with related video sequences, and is configured with small, off-the shelf and cheap components. Muithu requires little or no human post-processing, which is in strong contrast to state-of-the art resource-intensive ...
Fireflies: A Secure and Scalable Membership and Gossip Service
(Journal article; Tidsskriftartikkel; Peer reviewed, 2015-06)
An attacker who controls a computer in an overlay network can effectively control the entire overlay network if the mechanism managing membership information can successfully be targeted. This article describes Fireflies, an overlay network protocol that fights such attacks by organizing members in a verifiable pseudorandom structure so that an intruder cannot incorrectly modify the membership views ...
Digital Chronofiles of Life Experience
(Journal article; Tidsskriftartikkel; Peer reviewed, 2015)
Efficient disease detection in gastrointestinal videos – global features versus neural networks
(Journal article; Tidsskriftartikkel; Peer reviewed, 2017-07-19)
Analysis of medical videos from the human gastrointestinal (GI) tract for detection and localization of abnormalities like lesions and diseases requires both high precision and recall. Additionally, it is important to support efficient, real-time processing for live feedback during (i) standard colonoscopies and (ii) scalability for massive population-based screening, which we conjecture can be done ...
Enforcing Privacy Policies with Meta-Code
(Konferansebidrag; Conference object, 2015)
This paper proposes a mechanism for expressing and enforcing
security policies for shared data. Security policies are expressed
as stateful meta-code operations; meta-code can express
a broad class of policies, including access-based policies,
use-based policies, obligations, and sticky policies with
declassification. The meta-code is interposed in the filesystem
access path to ensure policy ...
Engineering push-based web services
(Research report; Forskningsrapport, 2005)
Much of the content of popular Internet information
sources is highly dynamic: urgent in nature and sometimes
relevant only for a short time. The typical approach
to querying such dynamic sources is polling for
updates often.1 This strains the traditional pull-based
Internet and wastes network resources on transmitting
redundant information.
This paper focuses on how to structure the Internet
to ...
An extensible software architecture for mobile components
(Research report; Forskningsrapport, 2000-10-06)
This paper presents a generic software architecture for large-scale distributed applications where mobile agents are an integral part. We have devised this architecture through completion of a series of mobile agent systems and associated applications over the last 8 years.
Performance experiments with the Storm View Distributed Parallel Volume Renderer.
(Research report; Forskningsrapport, 1995-06)
Volume rendering is a useful but cpu-intensive method for visualizing large scalar fields. The time to render a single image may be reduced by parallel processing. This paper reports on performance experiments with the StormView volume renderer, which is parallelized on a set of 57 MIPS / 17 MFLOPS workstations connected by a 10 Mbps Ethernet. For certain user patterns, we show that our parallelization ...
A programmable structure for pervasive computing
(Research report; Forskningsrapport, 2004)
This exstended abstract presents an asymmetric and programmable (extensible) approach to pervasive computing. The idea is to off-load computations from light portable clients into a back-bone of seamlessly integrated servers. This way, a user can extend and personalize his pervasive computational environment by installing computations following his trajectory throughout the day. Focus on this extended ...
An approach towards an agent computing environment
(Research report; Forskningsrapport, 1998)
We devise a mobile agent middleware architecture for supporting distributed applications in a wide-area network. The architecture provides a structural framework for functional components that are needed to support mobile agents in asymmetric networking environments.