Sciweavers

1356 search results - page 114 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
ICCV
2001
IEEE
14 years 10 months ago
Separating Appearance from Deformation
By representing images and image prototypes by linear subspaces spanned by "tangent vectors" (derivatives of an image with respect to translation, rotation, etc.), impre...
Nebojsa Jojic, Patrice Simard, Brendan J. Frey, Da...
PERCOM
2011
ACM
13 years 3 months ago
AnonySense: A system for anonymous opportunistic sensing
We describe AnonySense, a privacy-aware system for realizing pervasive applications based on collaborative, opportunistic sensing by personal mobile devices. AnonySense allows app...
Minho Shin, Cory Cornelius, Daniel Peebles, Apu Ka...
COLCOM
2005
IEEE
14 years 1 months ago
Providing both scale and security through a single core probabilistic protocol
Distributed systems are typically designed for scale and performance first, which makes it difficult to add security later without affecting the original properties. This paper ...
Ramsés Morales, Indranil Gupta
VLDB
2004
ACM
111views Database» more  VLDB 2004»
14 years 1 months ago
Technology Challenges in a Data Warehouse
This presentation will discuss several database technology challenges that are faced when building a data warehouse. It will touch on the challenges posed by high capacity drives ...
Ramesh Bhashyam
ICDCS
2011
IEEE
12 years 7 months ago
Smart Redundancy for Distributed Computation
Many distributed software systems allow participation by large numbers of untrusted, potentially faulty components on an open network. As faults are inevitable in this setting, th...
Yuriy Brun, George Edwards, Jae Young Bang, Nenad ...