Sciweavers

8655 search results - page 533 / 1731
» Challenges for Trusted Computing
Sort
View
167
Voted
SIGCOMM
2012
ACM
13 years 7 months ago
Energino: energy saving tips for your wireless network
The energy wasted in wireless networks is a serious concern and the main challenge lies in determining when and where the energy is wasted. In this demo, we present Energino, an e...
Roberto Riggio, Cigdem Sengul, Karina Mabell Gomez...
SIGCOMM
2012
ACM
13 years 7 months ago
Reviving delay-based TCP for data centers
With the rapid growth of data centers, minimizing the queueing delay at network switches has been one of the key challenges. In this work, we analyze the shortcomings of the curre...
Changhyun Lee, Keon Jang, Sue B. Moon
CVPR
2012
IEEE
13 years 7 months ago
Keystroke dynamics for user authentication
In this paper we investigate the problem of user authentication using keystroke biometrics. A new distance metric that is effective in dealing with the challenges intrinsic to key...
Yu Zhong, Yunbin Deng, Anil K. Jain
ACL
2012
13 years 7 months ago
Event Linking: Grounding Event Reference in a News Archive
Interpreting news requires identifying its constituent events. Events are complex linguistically and ontologically, so disambiguating their reference is challenging. We introduce ...
Joel Nothman, Matthew Honnibal, Ben Hachey, James ...

Publication
250views
16 years 6 months ago
Limited bus stop service: An evaluation of an implementation strategy
Transit agencies implement limited-stop (express) bus services as a mean to provide an attractive and competitive transportation mode when compared to the automobile. In 2008, the ...
El-Geneidy, A. & Surprenant-Legault, J.