Sciweavers

592 search results - page 71 / 119
» User adaptation: good results from poor systems
Sort
View
SIGOPS
2008
116views more  SIGOPS 2008»
13 years 9 months ago
Practical techniques for purging deleted data using liveness information
The layered design of the Linux operating system hides the liveness of file system data from the underlying block layers. This lack of liveness information prevents the storage sy...
David Boutcher, Abhishek Chandra
PERCOM
2009
ACM
14 years 9 months ago
High Accuracy Context Recovery using Clustering Mechanisms
This paper examines the recovery of user context in indoor environments with existing wireless infrastructures to enable assistive systems. We present a novel approach to the extra...
Dinh Q. Phung, Brett Adams, Kha Tran, Svetha Venka...
BIOSIG
2003
140views Biometrics» more  BIOSIG 2003»
13 years 10 months ago
Multifactor Biometric Sketch Authentication
: In this paper we propose a multifactor biometric sketch authentication method based on biometric sketch recognition and a user’s personal knowledge about the sketch‘s content...
Arslan Brömme, Stephan Al-Zubi
DPD
1998
117views more  DPD 1998»
13 years 8 months ago
Solving Local Cost Estimation Problem for Global Query Optimization in Multidatabase Systems
To meet users’ growing needs for accessing pre-existing heterogeneous databases, a multidatabase system (MDBS) integrating multiple databases has attracted many researchers recen...
Qiang Zhu, Per-Åke Larson
AICT
2010
IEEE
240views Communications» more  AICT 2010»
13 years 20 days ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...