Sciweavers

117 search results - page 8 / 24
» Security Enhancement and Performance Evaluation of an Object...
Sort
View
ICPR
2008
IEEE
14 years 2 months ago
Enhanced speaker recognition based on intra-modal fusion and accent modeling
Speaker recognition systems, even though they have been around for four decades, have not been widely considered as standalone systems for biometric security because of their unac...
Srikanth Mangayyagari, Tanmoy Islam, Ravi Sankar
ICDCS
2010
IEEE
13 years 9 months ago
RoLo: A Rotated Logging Storage Architecture for Enterprise Data Centers
Abstract—We propose RoLo (Rotated Logging), a new logging architecture for RAID10 systems for enhanced energy efficiency, performance and reliability. By spreading destaging I/O...
Yinliang Yue, Lei Tian, Hong Jiang, Fang Wang, Dan...
STORAGESS
2005
ACM
14 years 1 months ago
Secure capabilities for a petabyte-scale object-based distributed file system
Recently, the Network-Attached Secure Disk (NASD) model has become a more widely used technique for constructing large-scale storage systems. However, the security system proposed...
Christopher Olson, Ethan L. Miller
WWW
2008
ACM
14 years 8 months ago
Web people search: results of the first evaluation and the plan for the second
This paper presents the motivation, resources and results for the first Web People Search task, which was organized as part of the SemEval-2007 evaluation exercise. Also, we will ...
Javier Artiles, Satoshi Sekine, Julio Gonzalo
DSN
2008
IEEE
14 years 2 months ago
Enhancing data availability in disk drives through background activities
Latent sector errors in disk drives affect only a few data sectors. They occur silently and are detected only when the affected area is accessed again. If a latent error is detect...
Ningfang Mi, Alma Riska, Evgenia Smirni, Erik Ried...