Sciweavers

783 search results - page 57 / 157
» Evaluating impact of manageability features on device perfor...
Sort
View
TMC
2010
136views more  TMC 2010»
13 years 6 months ago
Relay Node Deployment Strategies in Heterogeneous Wireless Sensor Networks
– While a lot of existing research attempts to extend the lifetime of a wireless sensor network (WSN) by designing energy efficient networking protocols, the impact of random dev...
Kenan Xu, Hossam S. Hassanein, Glen Takahara, Quan...
SWAP
2008
13 years 9 months ago
Semantic-based Automated Evaluation of Company Core Competence
Abstract. Core Competence evaluation is crucial for strategical choices in knowledge intensive companies. Such a process is usually manually performed by the management on the basi...
Simona Colucci, Eugenio Di Sciascio, Francesco M. ...
ICASSP
2010
IEEE
13 years 8 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
CNSM
2010
13 years 4 months ago
Risk management in VoIP infrastructures using support vector machines
Telephony over IP is exposed to multiple security threats. Conventional protection mechanisms do not fit into the highly dynamic, open and large-scale settings of VoIP infrastructu...
Mohamed Nassar, Oussema Dabbebi, Remi Badonnel, Ol...
ICS
1999
Tsinghua U.
14 years 15 hour ago
Symmetry and performance in consistency protocols
A consistency protocol can be termed symmetric if all processors are treated identically when they access common resources. By contrast, asymmetric protocols usually assign a home...
Peter J. Keleher