Sciweavers

1391 search results - page 43 / 279
» Ensuring data integrity in storage: techniques and applicati...
Sort
View
PERVASIVE
2007
Springer
14 years 11 months ago
Securing Pocket Hard Drives
Inexpensive portable storage devices that are available in the market today have made it easier for users to carry data and programs with them and borrow computing platforms when ...
Nishkam Ravi, Chandra Narayanaswami, Mandayam T. R...
IJWET
2008
98views more  IJWET 2008»
14 years 11 months ago
Warehousing complex data from the web
: Data warehousing and Online Analytical Processing (OLAP) technologies are now moving onto handling complex data that mostly originate from the web. However, integrating such data...
Omar Boussaid, Jérôme Darmont, Fadila...
IJCNN
2006
IEEE
15 years 5 months ago
Support Vector Machines to Weight Voters in a Voting System of Entity Extractors
—Support Vector Machines are used to combine the outputs of multiple entity extractors, thus creating a composite entity extraction system. The composite system has a significant...
Deborah Duong, James Venuto, Ben Goertzel, Ryan Ri...
COMPSEC
2008
116views more  COMPSEC 2008»
14 years 12 months ago
Enforcing memory policy specifications in reconfigurable hardware
While general-purpose processor based systems are built to enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reco...
Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timo...
MM
1997
ACM
131views Multimedia» more  MM 1997»
15 years 4 months ago
Continuous Display Using Heterogeneous Disk-Subsystems
A number of recent technological trends have made data intensive applications such as continuous media (audio and video) servers a reality. These servers store and retrieve a larg...
Roger Zimmermann, Shahram Ghandeharizadeh