Sciweavers

1709 search results - page 288 / 342
» An active network approach to virtual private networks
Sort
View
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
15 years 6 months ago
Teaching the principles of the hacker curriculum to undergraduates
The “Hacker Curriculum” exists as a mostly undocumented set of principles and methods for learning about information security. Hacking, in our view, is defined by the ability...
Sergey Bratus, Anna Shubina, Michael E. Locasto
COMPSAC
2009
IEEE
15 years 6 months ago
Real-Time Guarantees in Flexible Advance Reservations
—This paper deals with the problem of scheduling workflow applications with Quality of Service (QoS) constraints, comprising real-time and interactivity constraints, over a servi...
Kleopatra Konstanteli, Dimosthenis Kyriazis, Theod...
AINA
2007
IEEE
15 years 6 months ago
Un-biasing the Link Farm Effect in PageRank Computation
Link analysis is a critical component of current Internet search engines' results ranking software, which determines the ordering of query results returned to the user. The o...
Arnon Rungsawang, Komthorn Puntumapon, Bundit Mana...
CMSB
2009
Springer
15 years 3 months ago
Control Strategies for the Regulation of the Eukaryotic Heat Shock Response
Abstract. Elevated temperatures cause proteins in living cells to misfold. They start forming larger and larger aggregates that can eventually lead to the cell's death. The he...
Elena Czeizler, Eugen Czeizler, Ralph-Johan Back, ...
CORR
2010
Springer
184views Education» more  CORR 2010»
14 years 12 months ago
Image Pixel Fusion for Human Face Recognition
In this paper we present a technique for fusion of optical and thermal face images based on image pixel fusion approach. Out of several factors, which affect face recognition perfo...
Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita...