Sciweavers

3361 search results - page 14 / 673
» An Approach of Performance Evaluation in Authentic Database ...
Sort
View
90
Voted
ISSS
2002
IEEE
124views Hardware» more  ISSS 2002»
15 years 2 months ago
A New Performance Evaluation Approach for System Level Design Space Exploration
Application specific systems have potential for customization of design with a view to achieve a better costperformance-power trade-off. Such customization requires extensive de...
M. Balakrishnan, Anshul Kumar, C. P. Joshi
BIOSIG
2007
90views Biometrics» more  BIOSIG 2007»
14 years 11 months ago
Cryptographic protection of biometric templates: Chance, challenges and applications
: In this contribution a survey is presented about the possibilities and difficulties of a cryptographic protection of biometric information for the purpose of authentication. The ...
Ulrike Korte, Rainer Plaga
ADHOC
2007
104views more  ADHOC 2007»
14 years 9 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
CMG
2003
14 years 10 months ago
{Performance Modeling and Evaluation of Large-Scale J2EE Applications
The queueing Petri net (QPN) paradigm provides a number of benefits over conventional modeling paradigms such as queueing networks and generalized stochastic Petri nets. Using qu...
Samuel Kounev, Alejandro P. Buchmann
SEMWEB
2010
Springer
14 years 7 months ago
Using Semantics for Automating the Authentication of Web APIs
Recent technology developments in the area of services on the Web are marked by the proliferation of Web applications and APIs. The implementation and evolution of applications bas...
Maria Maleshkova, Carlos Pedrinaci, John Domingue,...