Sciweavers

3605 search results - page 613 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
USS
2004
13 years 11 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson
ICAC
2007
IEEE
14 years 4 months ago
Server-Level Power Control
We present a technique that controls the peak power consumption of a high-density server by implementing a feedback controller that uses precise, system-level power measurement to ...
Charles Lefurgy, Xiaorui Wang, Malcolm Ware
ICPR
2008
IEEE
14 years 4 months ago
Enhanced speaker recognition based on intra-modal fusion and accent modeling
Speaker recognition systems, even though they have been around for four decades, have not been widely considered as standalone systems for biometric security because of their unac...
Srikanth Mangayyagari, Tanmoy Islam, Ravi Sankar
WISE
2010
Springer
13 years 8 months ago
The Ubiquitous DBMS
Advancement in mobile computing technologies has prompted strong needs for database systems that can be used in small devices such as sensors, cellular phones, PDAs, car navigator...
Kyu-Young Whang
HAPTICS
2006
IEEE
14 years 4 months ago
Haptic-Based Biometrics: A Feasibility Study
Biometric systems identify users based on behavioral or physiological characteristics. The advantages of such systems over traditional authentication methods such as passwords are...
Mauricio Orozco Trujillo, Yednek Asfaw, Shervin Sh...