Sciweavers

8982 search results - page 1592 / 1797
» Applications of Aglet Technology
Sort
View
HICSS
2005
IEEE
125views Biometrics» more  HICSS 2005»
14 years 4 months ago
Taking Topic Detection From Evaluation to Practice
Abstract— The Topic Detection and Tracking (TDT) research community investigates information retrieval methods for organizing a constantly arriving stream of news articles by the...
James Allan, Stephen M. Harding, David Fisher, Alv...
ICDCS
2005
IEEE
14 years 4 months ago
Comparison of Approaches to Service Deployment
IT today is driven by the trend of increasing scale and complexity. Utility and Grid computing models, PlanetLab, and traditional data centers, are reaching the scale of thousands...
Vanish Talwar, Qinyi Wu, Calton Pu, Wenchang Yan, ...
IEEECIT
2005
IEEE
14 years 4 months ago
Interactive Web Service Choice-Making Based on Extended QoS Model
: Quality of Service (QoS) is a key factor in Web service advertising, choosing and runtime monitoring. Web service QoS is multi-faceted, fuzzy and dynamic. Current researches focu...
Yujie Mou, Jian Cao, Shen-sheng Zhang, Jianhong Zh...
ITCC
2005
IEEE
14 years 4 months ago
Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations
Recently, a lot of effort has been done to investigate all kinds of explicit formulae for speeding up group operation of hyperelliptic curve cryptosystem (HECC). In this paper, ex...
Xinxin Fan, Thomas J. Wollinger, Yumin Wang
SISW
2005
IEEE
14 years 4 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
« Prev « First page 1592 / 1797 Last » Next »