Sciweavers

42738 search results - page 8121 / 8548
» Search Computing Systems
Sort
View
HOTNETS
2010
14 years 11 months ago
CloudPolice: taking access control out of the network
Cloud computing environments impose new challenges on access control techniques due to multi-tenancy, the growing scale and dynamicity of hosts within the cloud infrastructure, an...
Lucian Popa 0002, Minlan Yu, Steven Y. Ko, Sylvia ...
124
Voted
INTERSPEECH
2010
14 years 11 months ago
Discriminative adaptation based on fast combination of DMAP and dfMLLR
This paper investigates the combination of discriminative adaptation techniques. The discriminative Maximum A-Posteriori (DMAP) adaptation and discriminative feature Maximum Likel...
Lukás Machlica, Zbynek Zajíc, Ludek ...
JAISE
2010
182views Algorithms» more  JAISE 2010»
14 years 11 months ago
Exploring semantics in activity recognition using context lattices
Studying human activities has significant implication in human beneficial applications such as personal healthcare. This research has been facilitated by the development of sensor ...
Juan Ye, Simon Dobson
JCST
2010
128views more  JCST 2010»
14 years 11 months ago
Queue Waiting Time Aware Dynamic Workflow Scheduling in Multicluster Environments
Abstract Workflows are prevailing in scientific computation. Multicluster environments emerge and provide more resources, benefiting workflows but also challenging the traditional ...
Zhi-Feng Yu, Wei-Song Shi
JDCTA
2010
143views more  JDCTA 2010»
14 years 11 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
« Prev « First page 8121 / 8548 Last » Next »