Sciweavers

1627 search results - page 276 / 326
» High Security Smartcards
Sort
View
118
Voted
DRR
2008
15 years 1 months ago
Interactive degraded document enhancement and ground truth generation
Degraded documents are frequently obtained in various situations. Examples of degraded document collections include historical document depositories, document obtained in legal an...
G. Bal, Gady Agam, Ophir Frieder, Gideon Frieder
108
Voted
HPDC
2010
IEEE
15 years 1 months ago
A data transfer framework for large-scale science experiments
Modern scientific experiments can generate hundreds of gigabytes to terabytes or even petabytes of data that may furthermore be maintained in large numbers of relatively small fil...
Wantao Liu, Brian Tieman, Rajkumar Kettimuthu, Ian...
93
Voted
CCR
2006
76views more  CCR 2006»
15 years 26 days ago
Unwanted traffic in 3G networks
The presence of "unwanted" (or background) traffic in the Internet is a well-known fact. In principle any network that has been engineered without taking its presence in...
Fabio Ricciato
118
Voted
CN
2006
124views more  CN 2006»
15 years 25 days ago
Packet classification using diagonal-based tuple space search
Multidimensional packet classification has attracted considerable research interests in the past few years due to the increasing demand on policy based packet forwarding and secur...
Fu-Yuan Lee, Shiuh-Pyng Shieh
112
Voted
COMCOM
2006
148views more  COMCOM 2006»
15 years 25 days ago
An adaptive bluetooth packet selection and scheduling scheme in interference environments
Bluetooth is a new technology for Wireless Personal Area Networks (WPANs). It intends to eliminate the need of wires and connectors between a variety of devices, like PCs and thei...
Chen-Han Shih, Kuochen Wang, Hung-Cheng Shih