Sciweavers

1116 search results - page 143 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
CGF
2010
171views more  CGF 2010»
13 years 4 months ago
Efficient Mean-shift Clustering Using Gaussian KD-Tree
Mean shift is a popular approach for data clustering, however, the high computational complexity of the mean shift procedure limits its practical applications in high dimensional ...
Chunxia Xiao, Meng Liu
MSS
2003
IEEE
108views Hardware» more  MSS 2003»
14 years 1 months ago
Effective Management of Hierarchical Storage Using Two Levels of Data Clustering
When data resides on tertiary storage, clustering is the key to achieving high retrieval performance. However, a straightforward approach to clustering massive amounts of data on ...
Ratko Orlandic
WICSA
2008
13 years 9 months ago
Using Types to Enforce Architectural Structure
The right software architecture is critical to achieving essential quality attributes, but these qualities are only realized if the program as implemented conforms to its intended...
Jonathan Aldrich
CCGRID
2009
IEEE
14 years 2 months ago
Resource Allocation Using Virtual Clusters
— We propose a novel approach for sharing cluster resources among competing jobs. The key advantage of our approach over current solutions is that it increases cluster utilizatio...
Mark Stillwell, David Schanzenbach, Fréd&ea...
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
14 years 1 months ago
Using Replication and Partitioning to Build Secure Distributed Systems
A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. T...
Lantian Zheng, Stephen Chong, Andrew C. Myers, Ste...