Sciweavers

4049 search results - page 642 / 810
» Neural Network Trainer through Computer Networks
Sort
View
AINA
2008
IEEE
15 years 5 months ago
Keep Passwords Away from Memory: Password Caching and Verification Using TPM
TPM is able to provide strong secure storage for sensitive data such as passwords. Although several commercial password managers have used TPM to cache passwords, they are not cap...
Hua Wang, Yao Guo, Xia Zhao, Xiangqun Chen
CONEXT
2008
ACM
15 years 5 months ago
Advantages of a PCE-based control plane for LISP
The Locator/Identifier Separation Protocol (LISP) is one of the candidate solutions to address the scalability issues in inter-domain routing. The current proposals for its contro...
Alberto Castro, Martín Germán, Xavie...
PERCOM
2010
ACM
15 years 1 months ago
All for one or one for all? Combining heterogeneous features for activity spotting
Abstract—Choosing the right feature for motion based activity spotting is not a trivial task. Often, features derived by intuition or that proved to work well in previous work ar...
Ulf Blanke, Bernt Schiele, Matthias Kreil, Paul Lu...
PERCOM
2011
ACM
14 years 7 months ago
Is ontology-based activity recognition really effective?
—While most activity recognition systems rely on data-driven approaches, the use of knowledge-driven techniques is gaining increasing interest. Research in this field has mainly...
Daniele Riboni, Linda Pareschi, Laura Radaelli, Cl...
DSN
2011
IEEE
14 years 3 months ago
High performance state-machine replication
Computer systems are usually made fault tolerant through replication. By replicating a service on multiple servers we make sure that if some replicas fail, the service can still b...
Parisa Jalili Marandi, Marco Primi, Fernando Pedon...