Sciweavers

14386 search results - page 2661 / 2878
» Algorithms for user interfaces
Sort
View
CCGRID
2009
IEEE
15 years 11 months ago
C-Meter: A Framework for Performance Analysis of Computing Clouds
—Cloud computing has emerged as a new technology that provides large amount of computing and data storage capacity to its users with a promise of increased scalability, high avai...
Nezih Yigitbasi, Alexandru Iosup, Dick H. J. Epema...
CSMR
2009
IEEE
15 years 11 months ago
Static Security Analysis Based on Input-Related Software Faults
It is important to focus on security aspects during the development cycle to deliver reliable software. However, locating security faults in complex systems is difficult and ther...
Csaba Nagy, Spiros Mancoridis
126
Voted
DSN
2009
IEEE
15 years 11 months ago
Spam detection in voice-over-IP calls through semi-supervised clustering
In this paper, we present an approach for detection of spam calls over IP telephony called SPIT in VoIP systems. SPIT detection is different from spam detection in email in that t...
Yu-Sung Wu, Saurabh Bagchi, Navjot Singh, Ratsamee...
GLOBECOM
2009
IEEE
15 years 11 months ago
Graph-Based Approach for Enhancing Capacity and Fairness in Wireless Mesh Networks
—Wireless Mesh Networks have been an emerging technology in the past years. They are mainly used for providing last-mile broadband wireless access. It is then highly recommended ...
Salim Nahle, Naceur Malouch
ICC
2009
IEEE
174views Communications» more  ICC 2009»
15 years 11 months ago
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault
—Biometric authentication is emerging as the promising solution to conventional cryptography based authentication technologies. However, protecting users’ biometric templates s...
Kai Xi, Jiankun Hu
« Prev « First page 2661 / 2878 Last » Next »