Sciweavers

2060 search results - page 217 / 412
» Performability Evaluation of Networked Storage Systems Using...
Sort
View
SAC
2008
ACM
13 years 8 months ago
Tag-aware recommender systems by fusion of collaborative filtering algorithms
Recommender Systems (RS) aim at predicting items or ratings of items that the user are interested in. Collaborative Filtering (CF) algorithms such as user- and item-based methods ...
Karen H. L. Tso-Sutter, Leandro Balby Marinho, Lar...
ICC
2007
IEEE
118views Communications» more  ICC 2007»
14 years 1 months ago
Efficient Group Management For Inter-PN Access Control
This paper presents an architecture for resource sharing in Personal Networks (PNs). Resources are not necessarily in the same authentication domain and the group that uses them is...
Ahmad Ahmad, Khaled Masmoudi, Hossam Afifi
ACISP
2005
Springer
14 years 2 months ago
Cancelable Key-Based Fingerprint Templates
Biometric based authentication can provide strong security guarantee about the identity of users. Security of biometric data is particularly important as compromise of the data wil...
Russell Ang, Reihaneh Safavi-Naini, Luke McAven
ENC
2008
IEEE
14 years 3 months ago
Adaptively Brokering Continuous Queries for Exploiting Streams
This paper introduces an approach for adaptively brokering queries for exploiting streams produced and consumed by devices with limited computing and storage capacities. Such devi...
José-Luis Zechinelli-Martini, Thierry Delot...
SIGCOMM
1996
ACM
14 years 1 months ago
On the Relevance of Long-Range Dependence in Network Traffic
There is much experimental evidence that network traffic processes exhibit ubiquitous properties of self-similarity and long-range dependence, i.e., of correlations over a wide ran...
Matthias Grossglauser, Jean-Chrysostome Bolot