Sciweavers

726 search results - page 76 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
ISCA
2009
IEEE
159views Hardware» more  ISCA 2009»
14 years 2 months ago
End-to-end register data-flow continuous self-test
While Moore’s Law predicts the ability of semi-conductor industry to engineer smaller and more efficient transistors and circuits, there are serious issues not contemplated in t...
Javier Carretero, Pedro Chaparro, Xavier Vera, Jau...
VEE
2005
ACM
130views Virtualization» more  VEE 2005»
14 years 1 months ago
The entropia virtual machine for desktop grids
Desktop distributed computing allows companies to exploit the idle cycles on pervasive desktop PC systems to increase the available computing power by orders of magnitude (10x - 1...
Brad Calder, Andrew A. Chien, Ju Wang, Don Yang
ADBIS
1997
Springer
131views Database» more  ADBIS 1997»
13 years 12 months ago
Centralized versus Distributed Index Schemes in OODBMS - A Performance Analysis
Recent work on client-server data-shipping OODBs has demonstratedthe usefulnessof localdatacachingat clientsites. In addition to data caching, index caching can provide substantia...
Julie Basu, Arthur M. Keller, Meikel Pöss
ICIP
2007
IEEE
14 years 2 months ago
Face Recognition using a Fast Model Synthesis from a Profile and a Frontal View
In our previous work we presented a new 2D-3D mixed face recognition scheme called Partial Principal Component Analysis (P2 CA) [1]. The main contribution of P2 CA is that it uses...
Antonio Rama, Francesc Tarres
SIGCOMM
2010
ACM
13 years 7 months ago
Privacy-preserving P2P data sharing with OneSwarm
Privacy--the protection of information from unauthorized disclosure--is increasingly scarce on the Internet, and yet increasingly important as every user becomes both a content co...
Tomas Isdal, Michael Piatek, Arvind Krishnamurthy,...