Sciweavers

4413 search results - page 794 / 883
» Security for biometric data
Sort
View
118
Voted
CCR
2007
135views more  CCR 2007»
15 years 3 months ago
Future internet: fundamentals and measurement
While the Internet is hardly “broken”, it has proved unable to integrate new ideas, new architectures, and provide paths for future integration of data, voice, rich media and ...
Thrasyvoulos Spyropoulos, Serge Fdida, Scott Kirkp...
138
Voted
JPDC
2006
81views more  JPDC 2006»
15 years 3 months ago
Implications of virtualization on Grids for high energy physics applications
The simulations used in the field of high energy physics are compute intensive and exhibit a high level of data parallelism. These features make such simulations ideal candidates ...
Laura Gilbert, Jeff Tseng, Rhys Newman, Saeed Iqba...
120
Voted
SIGMETRICS
2008
ACM
179views Hardware» more  SIGMETRICS 2008»
15 years 3 months ago
Xengine: a fast and scalable XACML policy evaluation engine
XACML has become the de facto standard for specifying access control policies for various applications, especially web services. With the explosive growth of web applications depl...
Alex X. Liu, Fei Chen, JeeHyun Hwang, Tao Xie
143
Voted
SP
2008
IEEE
122views Security Privacy» more  SP 2008»
15 years 3 months ago
Large-scale phylogenetic analysis on current HPC architectures
Abstract. Phylogenetic inference is considered a grand challenge in Bioinformatics due to its immense computational requirements. The increasing popularity and availability of larg...
Michael Ott, Jaroslaw Zola, Srinivas Aluru, Andrew...
155
Voted
TSMC
2008
133views more  TSMC 2008»
15 years 3 months ago
Trading With a Stock Chart Heuristic
Abstract--The efficient market hypothesis (EMH) is a cornerstone of financial economics. The EMH asserts that security prices fully reflect all available information and that the s...
William Leigh, Cheryl J. Frohlich, Steven Hornik, ...