Sciweavers

822 search results - page 153 / 165
» Visualization techniques utilizing the sensitivity analysis ...
Sort
View
124
Voted
CCS
2008
ACM
15 years 2 months ago
Towards practical biometric key generation with randomized biometric templates
Although biometrics have garnered significant interest as a source of entropy for cryptographic key generation, recent studies indicate that many biometric modalities may not actu...
Lucas Ballard, Seny Kamara, Fabian Monrose, Michae...
JPDC
2008
122views more  JPDC 2008»
15 years 10 days ago
Stochastic robustness metric and its use for static resource allocations
This research investigates the problem of robust static resource allocation for distributed computing systems operating under imposed Quality of Service (QoS) constraints. Often, ...
Vladimir Shestak, Jay Smith, Anthony A. Maciejewsk...
ICTAC
2010
Springer
14 years 11 months ago
Scalable Distributed Concolic Testing: A Case Study on a Flash Storage Platform
Flash memory has become a virtually indispensable component for mobile devices in today’s information society. However, conventional testing methods often fail to detect hidden b...
Yunho Kim, Moonzoo Kim, Nam Dang
TKDE
2012
207views Formal Methods» more  TKDE 2012»
13 years 2 months ago
Mining Web Graphs for Recommendations
—As the exponential explosion of various contents generated on the Web, Recommendation techniques have become increasingly indispensable. Innumerable different kinds of recommend...
Hao Ma, Irwin King, Michael R. Lyu
101
Voted
ISVC
2009
Springer
15 years 7 months ago
Wavelet-Based Representation of Biological Shapes
Modeling, characterization and analysis of biological shapes and forms are important in many computational biology studies. Shape representation challenges span the spectrum from s...
Bin Dong, Yu Mao, Ivo D. Dinov, Zhuowen Tu, Yongga...