Sciweavers

739 search results - page 76 / 148
» Resources for Evaluation of Summarization Techniques
Sort
View
ISCAPDCS
2004
14 years 11 months ago
A VFSA Scheduler for Radiative Transfer Data in Climate Models
Scheduling and load-balancing techniques play an integral role in reducing the overall execution time of scientific applications on clustered multi-node systems. The increasing co...
S. P. Muszala, Gita Alaghband, Daniel A. Connors, ...
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
Practical Broadcast Authentication in Sensor Networks
Broadcast authentication is a critical security service in sensor networks; it allows a sender to broadcast messages to multiple nodes in an authenticated way. µTESLA and multi-l...
Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodi...
ICDE
2004
IEEE
151views Database» more  ICDE 2004»
15 years 11 months ago
Benchmarking SAP R/3 Archiving Scenarios
According to a survey of the University of Berkeley [6], about 5 Exabytes of new information has been created in 2002. This information explosion affects also the database volumes...
Bernhard Zeller, Alfons Kemper
ICIP
2008
IEEE
15 years 4 months ago
Temporal scalability and layered transmission
The deployment of mobile multimedia broadcast services like Mobile TV over cellular networks has just started. The coverage in terms of delivered quality per receiver is an import...
Cornelius Hellge, Thomas Schierl, Jörg Huschk...
DBSEC
2010
126views Database» more  DBSEC 2010»
14 years 11 months ago
Mining Likely Properties of Access Control Policies via Association Rule Mining
Abstract. Access control mechanisms are used to control which principals (such as users or processes) have access to which resources based on access control policies. To ensure the...
JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altuna...