Sciweavers

10271 search results - page 1994 / 2055
» Computer Science
Sort
View
BROADNETS
2004
IEEE
15 years 6 months ago
Capacity-Efficient Protection with Fast Recovery in Optically Transparent Mesh Networks
Survivability becomes increasingly critical in managing high-speed networks as data traffic continues to grow in both size and importance. In addition, the impact of failures is e...
Sun-il Kim, Steven S. Lumetta
120
Voted
CCS
2006
ACM
15 years 6 months ago
Secure hierarchical in-network aggregation in sensor networks
In-network aggregation is an essential primitive for performing queries on sensor network data. However, most aggregation algorithms assume that all intermediate nodes are trusted...
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
128
Voted
ECCV
2004
Springer
15 years 6 months ago
Approximate Confidence Intervals for Estimation of Matching Error Rates of Biometric Identification Devices
Abstract. Assessing the matching error rates of a biometric identification devices is integral to understanding its performance. Here we propose and evaluate several methods for cr...
Travis J. Atkinson, Michael E. Schuckers
DRM
2006
Springer
15 years 5 months ago
The problem with rights expression languages
In this paper we consider the functionality that a rights expression language (REL) should provide within a digital rights management (DRM) environment. We begin by noting the dea...
Pramod A. Jamkhedkar, Gregory L. Heileman, Iv&aacu...
SC
1995
ACM
15 years 5 months ago
Parallelizing the Phylogeny Problem
The problem of determining the evolutionary history of species in the form of phylogenetic trees is known as the phylogeny problem. We present a parallelization of the character c...
Jeff A. Jones, Katherine A. Yelick
« Prev « First page 1994 / 2055 Last » Next »