Sciweavers

596 search results - page 79 / 120
» Scalable security for large, high performance storage system...
Sort
View
IROS
2006
IEEE
140views Robotics» more  IROS 2006»
14 years 1 months ago
Developing a non-intrusive biometric environment
— The development of large scale biometric systems requires experiments to be performed on large amounts of data. Existing capture systems are designed for fixed experiments and...
Lee Middleton, David K. Wagg, Alex I. Bazin, John ...
WWW
2004
ACM
14 years 8 months ago
Edgecomputing: extending enterprise applications to the edge of the internet
Content delivery networks have evolved beyond traditional distributed caching. With services such as Akamai's EdgeComputing it is now possible to deploy and run enterprise bu...
Andy Davis, Jay Parikh, William E. Weihl
SIGCOMM
1998
ACM
13 years 12 months ago
A Digital Fountain Approach to Reliable Distribution of Bulk Data
—The proliferation of applications that must reliably distribute bulk data to a large number of autonomous clients motivates the design of new multicast and broadcast protocols. ...
John W. Byers, Michael Luby, Michael Mitzenmacher,...
ISASSCI
2001
13 years 9 months ago
Data Mining Architectures - A Comparative Study
Data mining is the process of deriving knowledge from data. The architecture of a data mining system plays a significant role in the efficiency with which data is mined. It is pro...
Thomas Thomas, Sanjeev Jayakumar, B. Muthukumaran
CLUSTER
2004
IEEE
13 years 11 months ago
FTC-Charm++: an in-memory checkpoint-based fault tolerant runtime for Charm++ and MPI
As high performance clusters continue to grow in size, the mean time between failure shrinks. Thus, the issues of fault tolerance and reliability are becoming one of the challengi...
Gengbin Zheng, Lixia Shi, Laxmikant V. Kalé