Sciweavers

6318 search results - page 1230 / 1264
» Data Leakage Detection
Sort
View
CONEXT
2007
ACM
15 years 1 months ago
Proactive replication in distributed storage systems using machine availability estimation
Distributed storage systems provide data availability by means of redundancy. To assure a given level of availability in case of node failures, new redundant fragments need to be ...
Alessandro Duminuco, Ernst Biersack, Taoufik En-Na...
CIKM
2009
Springer
15 years 1 months ago
Blogger-centric contextual advertising
This paper addresses the concept of Blogger-Centric Contextual Advertising, which refers to the assignment of personal ads to any blog page, chosen in according to bloggers' ...
Teng-Kai Fan, Chia-Hui Chang
ICDCS
2010
IEEE
15 years 1 months ago
Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining
—Wireless Sensor Network (WSN) applications are typically event-driven. While the source codes of these applications may look simple, they are executed with a complicated concurr...
Yangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchu...
ACSC
2004
IEEE
15 years 1 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
AIPR
2004
IEEE
15 years 1 months ago
Feasibility Study for the Development of a Motion Imagery Quality Metric
The motion imagery community would benefit from the availability of standard measures for assessing image interpretability. The National Imagery Interpretability Rating Scale (NII...
John M. Irvine, Charles Fenimore, David M. Cannon,...
« Prev « First page 1230 / 1264 Last » Next »