Sciweavers

822 search results - page 153 / 165
» Visualization techniques utilizing the sensitivity analysis ...
Sort
View
CCS
2008
ACM
13 years 10 months ago
Towards practical biometric key generation with randomized biometric templates
Although biometrics have garnered significant interest as a source of entropy for cryptographic key generation, recent studies indicate that many biometric modalities may not actu...
Lucas Ballard, Seny Kamara, Fabian Monrose, Michae...
JPDC
2008
122views more  JPDC 2008»
13 years 8 months ago
Stochastic robustness metric and its use for static resource allocations
This research investigates the problem of robust static resource allocation for distributed computing systems operating under imposed Quality of Service (QoS) constraints. Often, ...
Vladimir Shestak, Jay Smith, Anthony A. Maciejewsk...
ICTAC
2010
Springer
13 years 6 months ago
Scalable Distributed Concolic Testing: A Case Study on a Flash Storage Platform
Flash memory has become a virtually indispensable component for mobile devices in today’s information society. However, conventional testing methods often fail to detect hidden b...
Yunho Kim, Moonzoo Kim, Nam Dang
TKDE
2012
207views Formal Methods» more  TKDE 2012»
11 years 10 months ago
Mining Web Graphs for Recommendations
—As the exponential explosion of various contents generated on the Web, Recommendation techniques have become increasingly indispensable. Innumerable different kinds of recommend...
Hao Ma, Irwin King, Michael R. Lyu
ISVC
2009
Springer
14 years 2 months ago
Wavelet-Based Representation of Biological Shapes
Modeling, characterization and analysis of biological shapes and forms are important in many computational biology studies. Shape representation challenges span the spectrum from s...
Bin Dong, Yu Mao, Ivo D. Dinov, Zhuowen Tu, Yongga...