Sciweavers

878 search results - page 158 / 176
» A Compiler-Based Approach to Data Security
Sort
View
JSAC
2010
107views more  JSAC 2010»
14 years 8 months ago
Online learning in autonomic multi-hop wireless networks for transmitting mission-critical applications
Abstract—In this paper, we study how to optimize the transmission decisions of nodes aimed at supporting mission-critical applications, such as surveillance, security monitoring,...
Hsien-Po Shiang, Mihaela van der Schaar
DMIN
2006
111views Data Mining» more  DMIN 2006»
14 years 11 months ago
Profiling and Clustering Internet Hosts
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...
Songjie Wei, Jelena Mirkovic, Ezra Kissel
EDBT
2008
ACM
112views Database» more  EDBT 2008»
15 years 10 months ago
Providing freshness guarantees for outsourced databases
Database outsourcing becomes increasingly attractive as advances in network technologies eliminate the perceived performance difference between in-house databases and outsourced d...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
DGO
2008
112views Education» more  DGO 2008»
14 years 10 months ago
Mapping theory to practice: a cartographic analysis of public safety networks
This paper provides an interim report on ongoing data collection and analysis efforts as part of a large-scale study of information technology- focused interagency collaborations ...
Christine B. Williams, M. Lynne Markus, Michael Ty...
FAC
2007
128views more  FAC 2007»
14 years 9 months ago
Verifying a signature architecture: a comparative case study
Abstract. We report on a case study in applying different formal methods to model and verify an architecture for administrating digital signatures. The architecture comprises seve...
David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki...