Sciweavers

15251 search results - page 2820 / 3051
» Network Science - Theory and Application
Sort
View
APPT
2003
Springer
15 years 9 months ago
A Highly Efficient FC-SAN Based on Load Stream
The speed of storing and fetching data on SCSI disks has a great restriction on the efficiency of SAN based on Fiber Channel Network. In this paper, a high-efficient FC-SAN storage...
Jiwu Shu, Jun Yao, Changdong Fu, Weimin Zheng
AVBPA
2003
Springer
190views Biometrics» more  AVBPA 2003»
15 years 9 months ago
Combining Face and Iris Biometrics for Identity Verification
Face and iris identification have been employed in various biometric applications. Besides improving the verification performance, the fusion of both of the biometrics has several ...
Yunhong Wang, Tieniu Tan, Anil K. Jain
CCS
2003
ACM
15 years 9 months ago
k-anonymous message transmission
Informally, a communication protocol is sender k - anonymous if it can guarantee that an adversary, trying to determine the sender of a particular message, can only narrow down it...
Luis von Ahn, Andrew Bortz, Nicholas J. Hopper
138
Voted
DEXA
2003
Springer
106views Database» more  DEXA 2003»
15 years 9 months ago
Location Query Based on Moving Behaviors
The importance of location prediction is rapidly increasing with the current trend of database applications in mobile computing environment. However, current personal communicatio...
Ming-Hui Jin, Eric Hsiao-Kuang Wu, Jorng-Tzong Hor...
DSOM
2003
Springer
15 years 9 months ago
Towards Peer-to-Peer Traffic Analysis Using Flows
One of the main problems with today's Internet traffic analysis is caused by the large number of network-based applications whose types and traffic patterns are more complicat...
Myung-Sup Kim, Hun-Jeong Kang, James Won-Ki Hong
« Prev « First page 2820 / 3051 Last » Next »