Sciweavers

8655 search results - page 1280 / 1731
» Challenges for Trusted Computing
Sort
View
ICC
2009
IEEE
154views Communications» more  ICC 2009»
15 years 11 months ago
Load Balancing vs. Distributed Rate Limiting: An Unifying Framework for Cloud Control
— With the expansion of cloud-based services, the question as to how to control usage of such large distributed systems has become increasingly important. Load balancing (LB), an...
Rade Stanojevic, Robert Shorten
ICDAR
2009
IEEE
15 years 11 months ago
Graphic Symbol Recognition Using Graph Based Signature and Bayesian Network Classifier
We present a new approach for recognition of complex graphic symbols in technical documents. Graphic symbol recognition is a well known challenge in the field of document image an...
Muhammad Muzzamil Luqman, Thierry Brouard, Jean-Yv...
ICDAR
2009
IEEE
15 years 11 months ago
Devanagari and Bangla Text Extraction from Natural Scene Images
With the increasing popularity of digital cameras attached with various handheld devices, many new computational challenges have gained significance. One such problem is extractio...
Ujjwal Bhattacharya, Swapan K. Parui, Srikanta Mon...
P2P
2009
IEEE
112views Communications» more  P2P 2009»
15 years 11 months ago
SyMon: Defending large structured P2P systems against Sybil Attack
Sybil attack is one of the most challenging problems that plague current decentralized Peer-to-Peer systems. In Sybil attack, a single malicious user creates multiple peer identit...
B. S. Jyothi, D. Janakiram
P2P
2009
IEEE
15 years 11 months ago
On Tracking Freeriders in Gossip Protocols
Peer-to-peer content dissemination applications suffer immensely from freeriders, i.e., nodes that do not provide their fair share. The Tit-for-Tat (TfT) incentives have received ...
Rachid Guerraoui, Kévin Huguenin, Anne-Mari...
« Prev « First page 1280 / 1731 Last » Next »