Sciweavers

468 search results - page 93 / 94
» The System Administration Maturity Model - SAMM
Sort
View
SAC
2006
ACM
14 years 1 months ago
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Traditional Data Mining and Knowledge Discovery algorithms assume free access to data, either at a centralized location or in federated form. Increasingly, privacy and security co...
Hwanjo Yu, Xiaoqian Jiang, Jaideep Vaidya
NDSS
2003
IEEE
14 years 1 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
IPPS
1999
IEEE
14 years 6 days ago
Non-Preemptive Scheduling of Real-Time Threads on Multi-Level-Context Architectures
The rapid progress in high-performance microprocessor design has made it di cult to adapt real-time scheduling results to new models of microprocessor hardware, thus leaving an un...
Jan Jonsson, Henrik Lönn, Kang G. Shin
ESWA
2008
219views more  ESWA 2008»
13 years 8 months ago
Business intelligence approach to supporting strategy-making of ISP service management
The recent deregulation of telecommunication industry by the Taiwanese government has brought about the acute competition for Internet Service Providers (ISP). Taiwan's ISP i...
Sheng-Tun Li, Li-Yen Shue, Shu-Fen Lee
TMM
2008
85views more  TMM 2008»
13 years 7 months ago
Optimal Coding of Multilayer and Multiversion Video Streams
Abstract--Traditional video servers partially cope with heterogeneous client populations by maintaining a few versions of the same stream with different bit rates. More recent vide...
Cheng-Hsin Hsu, Mohamed Hefeeda