Sciweavers

1369 search results - page 211 / 274
» A Practical Implementation of the Timing Attack
Sort
View
CLUSTER
2009
IEEE
15 years 5 months ago
An innovative application execution toolkit for multicluster grids
—Multicluster grids provide one promising solution to satisfying growing computation demands of compute-intensive applications by collaborating various networked clusters. Howeve...
Zhifeng Yun, Zhou Lei, Gabrielle Allen, Daniel S. ...
ICASSP
2009
IEEE
15 years 5 months ago
Benchmarking flexible adaptive time-frequency transforms for underdetermined audio source separation
We have implemented several fast and flexible adaptive lapped orthogonal transform (LOT) schemes for underdetermined audio source separation. This is generally addressed by time-...
Andrew Nesbit, Emmanuel Vincent, Mark D. Plumbley
ICDM
2009
IEEE
168views Data Mining» more  ICDM 2009»
15 years 5 months ago
Bi-relational Network Analysis Using a Fast Random Walk with Restart
—Identification of nodes relevant to a given node in a relational network is a basic problem in network analysis with great practical importance. Most existing network analysis ...
Jing Xia, Doina Caragea, William H. Hsu
ICPPW
2009
IEEE
15 years 5 months ago
Load Balancing Concurrent BPEL Processes by Dynamic Selection of Web Service Endpoints
Business workflows implemented as BPEL processes play an important role for many business applications. BPEL is used to orchestrate a series of Web service calls. Which provider ...
Marvin Ferber, Sascha Hunold, Thomas Rauber
ADC
2009
Springer
175views Database» more  ADC 2009»
15 years 5 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang