Sciweavers

8503 search results - page 1353 / 1701
» Secure Software Architectures
Sort
View
141
Voted
JSW
2008
127views more  JSW 2008»
15 years 3 months ago
A Trust Based System for Enhanced Spam Filtering
The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to filtering techniques and the lack of incentive for mail servers to filter outgoing ...
Jimmy McGibney, Dmitri Botvich
137
Voted
MTA
2008
93views more  MTA 2008»
15 years 3 months ago
Digital audiobook: from passive to active pursuit
The digital home entertainment market is growing at an exceptional speed and, although limited to passive listeners, audiobook applications are growing at an annual rate of nearly ...
Marco Furini
NETWORK
2006
96views more  NETWORK 2006»
15 years 3 months ago
A wireless biosensor network using autonomously controlled animals
Recent research shows that animals can be guided remotely by stimulating regions of the brain. Therefore, it is possible to set up an animal wireless sensor network for search and...
Yihan Li, Shivendra S. Panwar, Shiwen Mao
130
Voted
SIGOPS
2008
156views more  SIGOPS 2008»
15 years 3 months ago
O2S2: enhanced object-based virtualized storage
Object based storage devices (OSDs) elevate the level of abstraction presented to clients, thereby permitting them to offer methods for managing, sharing, and securing information...
Himanshu Raj, Karsten Schwan
163
Voted
JCIT
2007
159views more  JCIT 2007»
15 years 3 months ago
GDIA: A Scalable Grid Infrastructure for Data Intensive Applications
The applications in many scientific fields, like bioinformatics and high-energy physics etc, increasingly demand the computing infrastructures can provide more computing power and...
Xiaohui Wei, Zhaohui Ding, Wilfred W. Li, Osamu Ta...
« Prev « First page 1353 / 1701 Last » Next »