Sciweavers

117 search results - page 18 / 24
» Why Cryptosystems Fail
Sort
View
CISIS
2009
IEEE
14 years 3 months ago
Strengths and Weaknesses of Maturity Driven Process Improvement Effort
In the recent decades most of the big organizations have adopted maturity driven process improvement efforts (MDPI). Most of these efforts have been inspired of maturity models li...
Asadullah Shaikh, Ashfaq Ahmed, Nasrullah Memon, M...
ICTAI
2009
IEEE
14 years 3 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
ICDM
2008
IEEE
107views Data Mining» more  ICDM 2008»
14 years 2 months ago
Graph-Based Iterative Hybrid Feature Selection
When the number of labeled examples is limited, traditional supervised feature selection techniques often fail due to sample selection bias or unrepresentative sample problem. To ...
ErHeng Zhong, Sihong Xie, Wei Fan, Jiangtao Ren, J...
ISCA
2007
IEEE
146views Hardware» more  ISCA 2007»
14 years 2 months ago
Virtual hierarchies to support server consolidation
Server consolidation is becoming an increasingly popular technique to manage and utilize systems. This paper develops CMP memory systems for server consolidation where most sharin...
Michael R. Marty, Mark D. Hill
MUE
2007
IEEE
190views Multimedia» more  MUE 2007»
14 years 2 months ago
On Clustering Multimedia Time Series Data Using K-Means and Dynamic Time Warping
After the generation of multimedia data turned digital, an explosion of interest in their data storage, retrieval, and processing has drastically increased. This includes videos, ...
Vit Niennattrakul, Chotirat Ann Ratanamahatana