Sciweavers

684 search results - page 137 / 137
» Evaluating Quality of Web Services: A Risk-Driven Approach
Sort
View
ICICS
2005
Springer
13 years 10 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
ISMIR
2005
Springer
206views Music» more  ISMIR 2005»
13 years 10 months ago
Improving Content-Based Similarity Measures by Training a Collaborative Model
We observed that for multimedia data – especially music - collaborative similarity measures perform much better than similarity measures derived from content-based sound feature...
Richard Stenzel, Thomas Kamps
DKE
2007
130views more  DKE 2007»
13 years 4 months ago
Enabling access-privacy for random walk based data analysis applications
Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queuing. These models enable the desc...
Ping Lin, K. Selçuk Candan
EUROSYS
2007
ACM
14 years 1 months ago
Adaptive control of virtualized resources in utility computing environments
Data centers are often under-utilized due to over-provisioning as well as time-varying resource demands of typical enterprise applications. One approach to increase resource utili...
Pradeep Padala, Kang G. Shin, Xiaoyun Zhu, Mustafa...