Sciweavers

8243 search results - page 1624 / 1649
» Can We Manage Trust
Sort
View
CODES
2009
IEEE
14 years 3 months ago
FRA: a flash-aware redundancy array of flash storage devices
Since flash memory has many attractive characteristics such as high performance, non-volatility, low power consumption and shock resistance, it has been widely used as storage med...
Yangsup Lee, Sanghyuk Jung, Yong Ho Song
GLOBECOM
2009
IEEE
14 years 3 months ago
Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security
—The emerging biometric cryptography has gained significant interests for key management and privacy protection, but the previously proposed schemes using set metrics for finge...
Jinyang Shi, Kwok-Yan Lam, Ming Gu, Husheng Li
NCA
2009
IEEE
14 years 3 months ago
Maintaining Network QoS Across NIC Device Driver Failures Using Virtualization
: © Maintaining Network QoS Across NIC Device Driver Failures Using Virtualization Michael Le, Andrew Gallagher, Yuval Tamir, Yoshio Turner HP Laboratories HPL-2009-115 device dri...
Michael Le, Andrew Gallagher, Yuval Tamir, Yoshio ...
ATAL
2009
Springer
14 years 3 months ago
From DPS to MAS to ...: continuing the trends
The most important and interesting of the computing challenges we are facing are those that involve the problems and opportunities afforded by massive decentralization and disinte...
Michael N. Huhns
COSIT
2009
Springer
116views GIS» more  COSIT 2009»
14 years 3 months ago
The Endpoint Hypothesis: A Topological-Cognitive Assessment of Geographic Scale Movement Patterns
Movement patterns of individual entities at the geographic scale are becoming a prominent research focus in spatial sciences. One pertinent question is how cognitive and formal cha...
Alexander Klippel, Rui Li
« Prev « First page 1624 / 1649 Last » Next »