Sciweavers

783 search results - page 81 / 157
» Evaluating impact of manageability features on device perfor...
Sort
View
COMCOM
2007
100views more  COMCOM 2007»
13 years 7 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia
SIGMOD
2004
ACM
154views Database» more  SIGMOD 2004»
14 years 8 months ago
Compressing Historical Information in Sensor Networks
We are inevitably moving into a realm where small and inexpensive wireless devices would be seamlessly embedded in the physical world and form a wireless sensor network in order t...
Antonios Deligiannakis, Yannis Kotidis, Nick Rouss...
FGR
2006
IEEE
159views Biometrics» more  FGR 2006»
14 years 1 months ago
A Near-infrared Image Based Face Recognition System
In this paper, we present a near infrared (NIR) image based face recognition system. Firstly, we describe a design of NIR image capture device which minimizes influence of enviro...
Stan Z. Li, Lun Zhang, ShengCai Liao, XiangXin Zhu...
CCGRID
2007
IEEE
14 years 2 months ago
Exploiting Lustre File Joining for Effective Collective IO
Lustre is a parallel file system that presents high aggregated IO bandwidth by striping file extents across many storage devices. However, our experiments indicate excessively wid...
Weikuan Yu, Jeffrey S. Vetter, Shane Canon, Song J...
CIKM
2009
Springer
14 years 13 days ago
Low-cost management of inverted files for online full-text search
In dynamic environments with frequent content updates, we require online full-text search that scales to large data collections and achieves low search latency. Several recent met...
Giorgos Margaritis, Stergios V. Anastasiadis