Sciweavers

773 search results - page 110 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
ETFA
2008
IEEE
15 years 8 months ago
Towards migrating legacy real-time systems to multi-core platforms
Power consumption and thermal problems limit the single-core processors to be faster. Processor architects are therefore moving toward multi-core processors. Developers of embedde...
Farhang Nemati, Johan Kraft, Thomas Nolte
HICSS
2008
IEEE
134views Biometrics» more  HICSS 2008»
15 years 8 months ago
Simplified Use Case Driven Approach (SUCADA) for Conversion of Legacy System to COTS Package
The conversion of a legacy system to a system based on a commercial-off-the-shelf (COTS) package demands a dedicated guidance. The assumption that it is just a matter of adopting ...
Jose D. Montero, YongSeog Kim, Jeff Johnson
ICARCV
2008
IEEE
222views Robotics» more  ICARCV 2008»
15 years 8 months ago
Robust fusion using boosting and transduction for component-based face recognition
—Face recognition performance depends upon the input variability as encountered during biometric data capture including occlusion and disguise. The challenge met in this paper is...
Fayin Li, Harry Wechsler, Massimo Tistarelli
96
Voted
ICDE
2008
IEEE
125views Database» more  ICDE 2008»
15 years 8 months ago
On breaching enterprise data privacy through adversarial information fusion
— Data privacy is one of the key challenges faced by enterprises today. Anonymization techniques address this problem by sanitizing sensitive data such that individual privacy is...
Srivatsava Ranjit Ganta, Raj Acharya
RTAS
2008
IEEE
15 years 8 months ago
Virtualizing Disk Performance
Large- and small-scale storage systems frequently serve a mixture of workloads, an increasing number of which require some form of performance guarantee. Providing guaranteed disk...
Tim Kaldewey, Theodore M. Wong, Richard A. Golding...