Sciweavers

2663 search results - page 35 / 533
» How to Choose a Timing Model
Sort
View
VLDB
1989
ACM
107views Database» more  VLDB 1989»
14 years 1 months ago
Scheduling Real-Time Transactions with Disk Resident Data
Managingtransactionswith real-timerequirements and disk residentdata presentsmany new problems.In thispaperweaddressseveral:How canwe scheduletransactionswith deadlines?How do the...
Robert K. Abbott, Hector Garcia-Molina
CVPR
2012
IEEE
12 years 2 days ago
Model recommendation for action recognition
Simply choosing one model out of a large set of possibilities for a given vision task is a surprisingly difficult problem, especially if there is limited evaluation data with whi...
Pyry Matikainen, Rahul Sukthankar, Martial Hebert
INFOCOM
2008
IEEE
14 years 4 months ago
Modeling Resource Sharing Dynamics of VoIP Users over a WLAN Using a Game-Theoretic Approach
—We consider a scenario in which users share an access point and are mainly interested in VoIP applications. Each user is allowed to adapt to varying network conditions by choosi...
Edson H. Watanabe, Daniel S. Menasché, Edmu...
TISSEC
2008
106views more  TISSEC 2008»
13 years 9 months ago
On predictive models and user-drawn graphical passwords
In commonplace text-based password schemes, users typically choose passwords that are easy to recall, exhibit patterns, and are thus vulnerable to brute-force dictionary attacks. ...
Paul C. van Oorschot, Julie Thorpe
CRYPTO
2004
Springer
138views Cryptology» more  CRYPTO 2004»
14 years 3 months ago
Secure Identity Based Encryption Without Random Oracles
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model. Selective identity secure IBE is a slightly w...
Dan Boneh, Xavier Boyen