Sciweavers

5 search results - page 1 / 1
» Private Processing of Outsourced Network Functions: Feasibil...
Sort
View
WWW
2008
ACM
14 years 5 months ago
Setting Access Permission through Transitive Relationship in Web-based Social Networks
The rising popularity of Web 2.0, such as blogs, forums, online calendars/diaries, etc., makes users more interested in keeping their data on the Web. Sharing of such data could m...
Dan Hong, Vincent Y. Shen
KES
2007
Springer
13 years 4 months ago
Creating Chances Through Cognitive Niche Construction
Abstract As a matter of fact, humans continuously delegate and distribute cognitive functions to the environment to lessen their limits. They build models, representations, and oth...
Lorenzo Magnani
EENERGY
2010
13 years 8 months ago
Event-driven processor power management
Energy-efficient computing as a research area has been receiving increasing attention in recent years due to rising energy costs and environmental awareness. In this paper, we pre...
Jan Hendrik Schönherr, Jan Richling, Matthias...
DSN
2004
IEEE
13 years 8 months ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda
ICDE
2006
IEEE
132views Database» more  ICDE 2006»
13 years 10 months ago
Treatment of Rules in Individual Metadata of Flexible Contents Management
The properties of contents stored in a computer system are very wide while the data volume treated in the system becomes very large. It is important to treat each stored object in...
Kensuke Ohta, Dai Kobayashi, Takashi Kobayashi, Ry...