Sciweavers

2699 search results - page 482 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
RTDB
1996
131views more  RTDB 1996»
13 years 9 months ago
Value-cognizant Admission Control Strategies for Real-Time DBMS
We propose and evaluate an admission control paradigm for RTDBS, in which a transaction is submitted to the system as a pair of processes: a primary task, and a recovery block. Th...
Azer Bestavros, Sue Nagy
CCGRID
2010
IEEE
13 years 8 months ago
A Fair Decentralized Scheduler for Bag-of-Tasks Applications on Desktop Grids
Desktop Grids have become very popular nowadays, with projects that include hundred of thousands computers. Desktop grid scheduling faces two challenges. First, the platform is vo...
Javier Celaya, Loris Marchal
ICASSP
2010
IEEE
13 years 7 months ago
Boosted binary features for noise-robust speaker verification
The standard approach to speaker verification is to extract cepstral features from the speech spectrum and model them by generative or discriminative techniques. We propose a nov...
Anindya Roy, Mathew Magimai-Doss, Sébastien...
ADT
2006
13 years 7 months ago
Rethinking end-to-end failover with transport layer multihoming
Using the application of bulk data transfer, we investigate end-to-end failover mechanisms and thresholds for transport protocols that support multihoming (e.g., SCTP). First, we e...
Armando L. Caro Jr., Paul D. Amer, Randall R. Stew...
IEICET
2008
127views more  IEICET 2008»
13 years 7 months ago
Image and Video Quality Assessment Using LCD: Comparisons with CRT Conditions
In this paper, the impact of display on quality assessment is addressed. Subjective quality assessment experiments have been performed on both LCD and CRT displays. Two sets of st...
Sylvain Tourancheau, Patrick Le Callet, Dominique ...