Sciweavers

1006 search results - page 153 / 202
» Optimizing Performance of Web Service Providers
Sort
View
FC
2007
Springer
117views Cryptology» more  FC 2007»
15 years 3 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
EGC
2005
Springer
15 years 3 months ago
Statistical Modeling and Segmentation in Cardiac MRI Using a Grid Computing Approach
Abstract. Grid technology is widely emerging as a solution for wide-spread applicability of computerized analysis and processing procedures in biomedical sciences. In this paper we...
Sebastián Ordas, Hans C. van Assen, Loic Bo...
WSDM
2012
ACM
290views Data Mining» more  WSDM 2012»
13 years 5 months ago
Online selection of diverse results
The phenomenal growth in the volume of easily accessible information via various web-based services has made it essential for service providers to provide users with personalized ...
Debmalya Panigrahi, Atish Das Sarma, Gagan Aggarwa...
TON
2010
161views more  TON 2010»
14 years 4 months ago
Investigating Self-Similarity and Heavy-Tailed Distributions on a Large-Scale Experimental Facility
Abstract--After the seminal work by Taqqu et al. relating selfsimilarity to heavy-tailed distributions, a number of research articles verified that aggregated Internet traffic time...
Patrick Loiseau, Paulo Gonçalves, Guillaume...
ICDE
2003
IEEE
180views Database» more  ICDE 2003»
15 years 11 months ago
PeerDB: A P2P-based System for Distributed Data Sharing
In this paper, we present the design and evaluation of PeerDB, a peer-to-peer (P2P) distributed data sharing system. PeerDB distinguishes itself from existing P2P systems in sever...
Wee Siong Ng, Beng Chin Ooi, Kian-Lee Tan, Aoying ...