Sciweavers

1123 search results - page 174 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
PERCOM
2003
ACM
16 years 3 months ago
BASE - A Micro-Broker-Based Middleware for Pervasive Computing
Pervasive computing environments add a multitude of additional devices to our current computing landscapes. Specialized embedded systems provide sensor information about the real ...
Christian Becker, Gregor Schiele, Holger Gubbels, ...
ISCA
2005
IEEE
135views Hardware» more  ISCA 2005»
15 years 9 months ago
Deconstructing Commodity Storage Clusters
The traditional approach for characterizing complex systems is to run standard workloads and measure the resulting performance as seen by the end user. However, unique opportuniti...
Haryadi S. Gunawi, Nitin Agrawal, Andrea C. Arpaci...
ICCV
1995
IEEE
15 years 7 months ago
3D Human Body Model Acquisition from Multiple Views
We present a novel motion-based approach for the part determination and shape estimation of a human’s body parts. The novelty of the technique is that neither a prior model of t...
Ioannis A. Kakadiaris, Dimitris N. Metaxas
IHI
2012
217views Healthcare» more  IHI 2012»
13 years 11 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...
SASO
2007
IEEE
15 years 10 months ago
Identifying Malicious Peers Before It's Too Late: A Decentralized Secure Peer Sampling Service
Many unstructured peer to peer (P2P) systems rely on a Peer Sampling Service (PSS) that returns randomly sampled nodes from the population comprising the system. PSS protocols are...
Gian Paolo Jesi, David Hales, Maarten van Steen