Sciweavers

9245 search results - page 1586 / 1849
» Virtualization
Sort
View
USITS
2001
15 years 5 months ago
CSP: A Novel System Architecture for Scalable Internet and Communication Services
The boundary between the network edge and the front-end servers of the data center is blurring. Appliance vendors are flooding the market with new capabilities, while switch/route...
Hemal V. Shah, Dave B. Minturn, Annie Foong, Gary ...
VG
2001
15 years 5 months ago
Image-Based Rendering of Surfaces from Volume Data
We present an image-based rendering technique to accelerate surfaces rendering from volume data. We cache the fully volume rendered image (called keyview) and use it to generate n...
Baoquan Chen, Arie E. Kaufman, Qingyu Tang
SSWMC
2004
15 years 5 months ago
Towards fraud-proof ID documents using multiple data hiding technologies and biometrics
Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric ...
Justin Picard, Claus Vielhauer, Niels J. Thorwirth
SSWMC
2004
15 years 5 months ago
Searching for the stego-key
Steganalysis in the wide sense consists of first identifying suspicious objects and then further analysis during which we try to identify the steganographic scheme used for embedd...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
USENIX
2004
15 years 5 months ago
C-JDBC: Flexible Database Clustering Middleware
Large web or e-commerce sites are frequently hosted on clusters. Successful open-source tools exist for clustering the front tiers of such sites (web servers and application serve...
Emmanuel Cecchet, Julie Marguerite, Willy Zwaenepo...
« Prev « First page 1586 / 1849 Last » Next »