Sciweavers

6555 search results - page 1126 / 1311
» Secure attribute-based systems
Sort
View
165
Voted
CCR
2007
119views more  CCR 2007»
15 years 3 months ago
Exploiting KAD: possible uses and misuses
Peer-to-peer systems have seen a tremendous growth in the last few years and peer-to-peer traffic makes a major fraction of the total traffic seen in the Internet. The dominating ...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...
106
Voted
SIGOPS
2008
116views more  SIGOPS 2008»
15 years 3 months ago
Practical techniques for purging deleted data using liveness information
The layered design of the Linux operating system hides the liveness of file system data from the underlying block layers. This lack of liveness information prevents the storage sy...
David Boutcher, Abhishek Chandra
130
Voted
COMPUTER
1999
95views more  COMPUTER 1999»
15 years 3 months ago
Wide-Area Computing: Resource Sharing on a Large Scale
abstract over a complex set of resources and provide a high-level way to share and manage them over the network. To be effective, such a system must address the challenges posed by...
Andrew S. Grimshaw, Adam Ferrari, Frederick Knabe,...
ICIP
2007
IEEE
16 years 5 months ago
Three Dimensional Face Recognition using Wavelet Decomposition of Range Images
Interest in face recognition systems has increased significantly due to the emergence of significant commercial opportunities in surveillance and security applications. In this pa...
Sina Jahanbin, Hyohoon Choi, Alan C. Bovik, Kennet...
ICIP
2001
IEEE
16 years 5 months ago
Use of neural networks for behaviour understanding in railway transport monitoring applications
In the last years, the interest for advanced video-based surveillance applications is more and more growing. This is especially true in the field of railway urban transport where ...
Claudio Sacchi, Carlo S. Regazzoni, Gianluca Gera,...
« Prev « First page 1126 / 1311 Last » Next »