Sciweavers

3984 search results - page 538 / 797
» Using linked data for systems management
Sort
View
DIM
2006
ACM
15 years 8 months ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
MOBISYS
2004
ACM
16 years 2 months ago
Mimic: Raw Activity Shipping for File Synchronization in Mobile File Systems
In this paper, we consider the problem of file synchronization when a mobile host shares files with a backbone file server in a network file system. Several diff schemes have been...
Tae-Young Chang, Aravind Velayutham, Raghupathy Si...
164
Voted
SIGMETRICS
2008
ACM
214views Hardware» more  SIGMETRICS 2008»
15 years 2 months ago
HMTT: a platform independent full-system memory trace monitoring system
Memory trace analysis is an important technology for architecture research, system software (i.e., OS, compiler) optimization, and application performance improvements. Many appro...
Yungang Bao, Mingyu Chen, Yuan Ruan, Li Liu, Jianp...
ISCI
2007
84views more  ISCI 2007»
15 years 2 months ago
Simulating continuous fuzzy systems
: In our book to appear in print from Springer-Verlag GmbH, Simulating Continuous Fuzzy Systems, Buckley and Jowers, we use crisp continuous simulation under Matlab™/Simulink™ ...
Leonard J. Jowers, James J. Buckley, Kevin D. Reil...
CIKM
2006
Springer
15 years 4 months ago
Efficient range-constrained similarity search on wavelet synopses over multiple streams
Due to the resource limitation in the data stream environment, it has been reported that answering user queries according to the wavelet synopsis of a stream is an essential abili...
Hao-Ping Hung, Ming-Syan Chen