Sciweavers

5269 search results - page 916 / 1054
» Operating system resource management
Sort
View
CCR
2007
119views more  CCR 2007»
13 years 9 months ago
Exploiting KAD: possible uses and misuses
Peer-to-peer systems have seen a tremendous growth in the last few years and peer-to-peer traffic makes a major fraction of the total traffic seen in the Internet. The dominating ...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...
PRL
2007
148views more  PRL 2007»
13 years 8 months ago
Damascening video databases for evaluation of face tracking and recognition - The DXM2VTS database
Performance quantification of biometric systems, such as face tracking and recognition highly depend on the database used for testing the systems. Systems trained and tested on r...
Dereje Teferi, Josef Bigün
SIGMOD
2009
ACM
130views Database» more  SIGMOD 2009»
14 years 9 months ago
FlashLogging: exploiting flash devices for synchronous logging performance
Synchronous transactional logging is the central mechanism for ensuring data persistency and recoverability in database systems. Unfortunately, magnetic disks are ill-suited for t...
Shimin Chen
CSE
2009
IEEE
14 years 3 months ago
All Friends Are Not Created Equal: An Interaction Intensity Based Approach to Privacy in Online Social Networks
Recent research identifies a growing privacy problem that exists within Online Social Networks (OSNs). Several studies have shown how easily strangers can extract personal data a...
Lerone Banks, Shyhtsun Felix Wu
CCECE
2006
IEEE
14 years 3 months ago
A QoS Mapping Rule Builder
Although many QoS management architectures have been recently introduced with a lot of advanced features, they have never been widely used in the existing applications due to the ...
Kim Khoa Nguyen, Brigitte Kerhervé, Brigitt...