Sciweavers

674 search results - page 62 / 135
» A method proposal for architectural reliability evaluation
Sort
View
PERCOM
2007
ACM
15 years 9 months ago
Wireless Bonding for Maximizing Throughput in Multi-Radio Mesh Networks
To enhance the per node throughput, mesh nodes in wireless mesh networks can be equipped with multiple network interfaces (NIC). In this paper, we propose a new multi-interface equ...
Sung-Ho Kim, Young-Bae Ko
AVBPA
2005
Springer
395views Biometrics» more  AVBPA 2005»
14 years 11 months ago
A Score-Level Fusion Benchmark Database for Biometric Authentication
Fusing the scores of several biometric systems is a very promising approach to improve the overall system’s accuracy. Despite many works in the literature, it is surprising that ...
Norman Poh, Samy Bengio
DAC
2006
ACM
15 years 3 months ago
High-performance operating system controlled memory compression
This article describes a new software-based on-line memory compression algorithm for embedded systems and presents a method of adaptively managing the uncompressed and compressed ...
Lei Yang, Haris Lekatsas, Robert P. Dick
SAC
2009
ACM
15 years 4 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
VRST
2004
ACM
15 years 3 months ago
Modeling and rendering of walkthrough environments with panoramic images
An important, potential application of image-based techniques is to create photo-realistic image-based environments for interactive walkthrough. However, existing image-based stud...
Angus M. K. Siu, Ada S. K. Wan, Rynson W. H. Lau