Sciweavers

32 search results - page 6 / 7
» acsc 2006
Sort
View
ACSC
2009
IEEE
14 years 14 days ago
Microdata Protection Through Approximate Microaggregation
Microdata protection is a hot topic in the field of Statistical Disclosure Control, which has gained special interest after the disclosure of 658000 queries by the America Online...
Xiaoxun Sun, Hua Wang, Jiuyong Li
ACSC
2006
IEEE
13 years 11 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi
ACSC
2006
IEEE
13 years 11 months ago
Pruning subscriptions in distributed publish/subscribe systems
Publish/subscribe systems utilize filter algorithms to determine all subscriptions matching incoming event messages. To distribute such services, subscriptions are forwarded to s...
Sven Bittner, Annika Hinze
ACSC
2006
IEEE
13 years 11 months ago
Human visual perception of region warping distortions
Interactive virtual reality requires at least 60 frames per second in order to ensure smooth motion. For a good immersive experience, it is also necessary to have low end-to-end l...
Yang-Wai Chow, Ronald Pose, Matthew Regan, James P...
ACSC
2006
IEEE
13 years 11 months ago
Modelling layer 2 and layer 3 device bandwidths using B-node theory
Modern computer networks contain an amalgamation of devices and technologies, with the performance exhibited by each central to digital communications. Varieties of methods exist ...
S. Cikara, Stanislaw P. Maj, David T. Shaw