Sciweavers

8808 search results - page 1673 / 1762
» Process Change Patterns
Sort
View
ACSAC
2010
IEEE
15 years 15 days ago
Breaking e-banking CAPTCHAs
Many financial institutions have deployed CAPTCHAs to protect their services (e.g., e-banking) from automated attacks. In addition to CAPTCHAs for login, CAPTCHAs are also used to...
Shujun Li, S. Amier Haider Shah, M. Asad Usman Kha...
CLOUDCOM
2010
Springer
15 years 14 days ago
Using Global Behavior Modeling to Improve QoS in Cloud Data Storage Services
Abstract--The cloud computing model aims to make largescale data-intensive computing affordable even for users with limited financial resources, that cannot invest into expensive i...
Jesús Montes, Bogdan Nicolae, Gabriel Anton...
152
Voted
ICDM
2010
IEEE
212views Data Mining» more  ICDM 2010»
15 years 13 days ago
Modeling Information Diffusion in Implicit Networks
Social media forms a central domain for the production and dissemination of real-time information. Even though such flows of information have traditionally been thought of as diffu...
Jaewon Yang, Jure Leskovec
VRST
2010
ACM
15 years 9 days ago
An adaptive training-free feature tracker for mobile phones
While tracking technologies based on fiducial markers have dominated the development of Augmented Reality (AR) applications for almost a decade, various real-time capable approach...
Jan Herling, Wolfgang Broll
CLUSTER
2009
IEEE
15 years 8 days ago
Design alternatives for implementing fence synchronization in MPI-2 one-sided communication for InfiniBand clusters
Scientific computing has seen an immense growth in recent years. The Message Passing Interface (MPI) has become the de-facto standard for parallel programming model for distribute...
Gopalakrishnan Santhanaraman, Tejus Gangadharappa,...
« Prev « First page 1673 / 1762 Last » Next »