Sciweavers

6137 search results - page 1060 / 1228
» Securing Collaborative Applications
Sort
View
OOPSLA
2004
Springer
14 years 3 months ago
Method-level phase behavior in java workloads
Java workloads are becoming more and more prominent on various computing devices. Understanding the behavior of a Java workload which includes the interaction between the applicat...
Andy Georges, Dries Buytaert, Lieven Eeckhout, Koe...
EXPCS
2007
14 years 2 months ago
Towards user-centric metrics for denial-of-service measurement
To date, the measurement of user-perceived degradation of quality of service during denial of service (DoS) attacks remained an elusive goal. Current approaches mostly rely on low...
Jelena Mirkovic, Alefiya Hussain, Brett Wilson, So...
JMM2
2006
151views more  JMM2 2006»
13 years 10 months ago
On the Use of External Face Features for Identity Verification
Abstract-- In general automatic face classification applications images are captured in natural environments. In these cases, the performance is affected by variations in facial im...
Àgata Lapedriza, David Masip, Jordi Vitri&a...
WICOMM
2008
258views more  WICOMM 2008»
13 years 9 months ago
Introducing reliability and load balancing in mobile IPv6-based networks
With the recent advances in portable devices and wireless networks, a new paradigm of computing has emerged which is known as mobile computing. In general mobile computing can be ...
Jahanzeb Faizan, Hesham El-Rewini, Mohamed Khalil
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
14 years 11 months ago
What's Different: Distributed, Continuous Monitoring of Duplicate-Resilient Aggregates on Data Streams
Emerging applications in sensor systems and network-wide IP traffic analysis present many technical challenges. They need distributed monitoring and continuous tracking of events....
Graham Cormode, S. Muthukrishnan, Wei Zhuang
« Prev « First page 1060 / 1228 Last » Next »