Sciweavers

9186 search results - page 1618 / 1838
» A Module System for Scheme
Sort
View
SP
2009
IEEE
15 years 7 months ago
Privacy Weaknesses in Biometric Sketches
The increasing use of biometrics has given rise to new privacy concerns. Biometric encryption systems have been proposed in order to alleviate such concerns: rather than comparing...
Koen Simoens, Pim Tuyls, Bart Preneel
99
Voted
WMCSA
2009
IEEE
15 years 7 months ago
LiveCompare: grocery bargain hunting through participatory sensing
Many consumers are misled into paying high prices due to the search costs associated with attaining price information [16]. The popularity of bargain-hunting web sites like Slickd...
Linda Deng, Landon P. Cox
120
Voted
NOCS
2009
IEEE
15 years 7 months ago
Scalability of network-on-chip communication architecture for 3-D meshes
Design Constraints imposed by global interconnect delays as well as limitations in integration of disparate technologies make 3-D chip stacks an enticing technology solution for m...
Awet Yemane Weldezion, Matt Grange, Dinesh Pamunuw...
ICTAI
2009
IEEE
15 years 7 months ago
FlockStream: A Bio-Inspired Algorithm for Clustering Evolving Data Streams
Existing density-based data stream clustering algorithms use a two-phase scheme approach consisting of an online phase, in which raw data is processed to gather summary statistics...
Agostino Forestiero, Clara Pizzuti, Giandomenico S...
INFOCOM
2009
IEEE
15 years 7 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem
« Prev « First page 1618 / 1838 Last » Next »