Sciweavers

9059 search results - page 1733 / 1812
» The design of eco-feedback technology
Sort
View
103
Voted
CCS
2004
ACM
15 years 6 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
105
Voted
CIKM
2004
Springer
15 years 6 months ago
SWAM: a family of access methods for similarity-search in peer-to-peer data networks
Peer-to-peer Data Networks (PDNs) are large-scale, selforganizing, distributed query processing systems. Familiar examples of PDN are peer-to-peer file-sharing networks, which su...
Farnoush Banaei Kashani, Cyrus Shahabi
109
Voted
CIT
2004
Springer
15 years 6 months ago
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey th...
V. Anil Kumar, Dorgham Sisalem
132
Voted
CLEF
2004
Springer
15 years 6 months ago
Content-Based Queries on the CasImage Database Within the IRMA Framework
Abstract. Recent research has suggested that there is no general similarity measure, which can be applied on arbitrary databases without any parameterization. Hence, the optimal co...
Christian Thies, Mark Oliver Güld, Benedikt F...
109
Voted
GECCO
2004
Springer
137views Optimization» more  GECCO 2004»
15 years 6 months ago
Achieving Shorter Search Times in Voice Conversion Using Interactive Evolution
We have already proposed using evolutionary computation to adjust the voice quality conversion parameters, and we have reported that this approach produces results that are not onl...
Yuji Sato
« Prev « First page 1733 / 1812 Last » Next »