Sciweavers

5252 search results - page 903 / 1051
» Logic in Access Control
Sort
View
160
Voted
FTCS
1993
123views more  FTCS 1993»
15 years 5 months ago
Fast, On-Line Failure Recovery in Redundant Disk Arrays
This paper describes and evaluates two algorithms for performing on-line failure recovery (data reconstruction) in redundant disk arrays. It presents an implementation of disk-ori...
Mark Holland, Garth A. Gibson, Daniel P. Siewiorek
HPN
1992
15 years 5 months ago
A Host Interface Architecture for High-Speed Networks
This paper describes a new host interface architecture for high-speed networks operating at 800 of Mbit/second or higher rates. The architecture is targeted to achieve several 100...
Peter Steenkiste, Brian Zill, H. T. Kung, Steven S...
WCE
2007
15 years 5 months ago
Face Recognition using Discrete Cosine Transform plus Linear Discriminant Analysis
—Face recognition is a biometric identification method which among the other methods such as, finger print identification, speech recognition, signature and hand written recognit...
M. Hajiarbabi, J. Askari, S. Sadri, M. Saraee
ATAL
2010
Springer
15 years 5 months ago
Bushfire BLOCKS: a modular agent-based simulation
Bushfire BLOCKS is a modular, distributed, agent-based simulation for exploring and informing bushfire response strategies. Separate independent modules capture the fire spread, e...
David Scerri, Ferdinand Gouw, Sarah L. Hickmott, I...
ESORICS
2010
Springer
15 years 5 months ago
Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems
Abstract. Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and...
Rishab Nithyanand, Gene Tsudik, Ersin Uzun