Sciweavers

800 search results - page 139 / 160
» Information Entropy Measure for Evaluation of Image Quality
Sort
View
99
Voted
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
15 years 1 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
CORR
2008
Springer
133views Education» more  CORR 2008»
14 years 9 months ago
Faceted Ranking of Egos in Collaborative Tagging Systems
Multimedia uploaded content is tagged and recommended by users of collaborative systems, resulting in informal classifications also known as folksonomies. Faceted web ranking has ...
José Ignacio Orlicki, Pablo Ignacio Fierens...
IJHPCA
2007
116views more  IJHPCA 2007»
14 years 9 months ago
Pricing for Utility-Driven Resource Management and Allocation in Clusters
Users perceive varying levels of utility for each different job completed by the cluster. Therefore, there is a need for existing cluster Resource Management Systems (RMS) to prov...
Chee Shin Yeo, Rajkumar Buyya
JHSN
2000
172views more  JHSN 2000»
14 years 9 months ago
Dynamic token bucket (DTB): a fair bandwidth allocation algorithm for high-speed networks
Fair allocation of available bandwidth to competing flows is a simple form of quality of service (QoS) that can be provided to customers in packet-switched networks. A number of p...
Jayakrishna Kidambi, Dipak Ghosal, Biswanath Mukhe...
INFOCOM
2011
IEEE
14 years 28 days ago
Bayesian-inference based recommendation in online social networks
—In this paper, we propose a Bayesian-inference based recommendation system for online social networks. In our system, users share their content ratings with friends. The rating ...
Xiwang Yang, Yang Guo, Yong Liu