Sciweavers

4049 search results - page 572 / 810
» Neural Network Trainer through Computer Networks
Sort
View
110
Voted
NDSS
2007
IEEE
15 years 10 months ago
Cryptographic Methods for Storing Ballots on a Voting Machine
A direct recording electronic (DRE) voting machine must satisfy several requirements to ensure voter privacy and the integrity of the election. A recent proposal for a vote storag...
John Bethencourt, Dan Boneh, Brent Waters
134
Voted
ICMCS
2006
IEEE
151views Multimedia» more  ICMCS 2006»
15 years 9 months ago
CMUseum: A Location-aware Wireless Video Streaming System
Location-aware computing enables automatic tailoring of information and services based on the current location of a mobile user. We have designed and implemented CMUseum, a system...
Mei-Hsuan Lu, Tsuhan Chen
104
Voted
CCGRID
2005
IEEE
15 years 9 months ago
A distributed shared buffer space for data-intensive applications
Efficient memory allocation and data transfer for cluster-based data-intensive applications is a difficult task. Both changes in cluster interconnects and application workloads ...
Renaud Lachaize, Jorgen S. Hansen
128
Voted
IPPS
2005
IEEE
15 years 9 months ago
Securely Replicated Web Documents
In order to achieve better scalability and reduce latency in handling user requests, many Web applications make extensive use of data replication through caches and Content Delive...
Bogdan C. Popescu, Maarten van Steen, Bruno Crispo...
116
Voted
NDSS
2005
IEEE
15 years 9 months ago
A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities
Most Windows users run all the time with Admin privileges. This significantly increases the vulnerability of Windows systems because the compromise of any user-level application ...
Shuo Chen, John Dunagan, Chad Verbowski, Yi-Min Wa...