Sciweavers

883 search results - page 138 / 177
» An Access Control Model Based on Distributed Knowledge Manag...
Sort
View
102
Voted
DSN
2009
IEEE
15 years 4 months ago
Processor reliability enhancement through compiler-directed register file peak temperature reduction
Each semiconductor technology generation brings us closer to the imminent processor architecture heat wall, with all its associated adverse effects on system performance and reliab...
Chengmo Yang, Alex Orailoglu
96
Voted
MOBIWAC
2009
ACM
15 years 7 months ago
The sociable traveller: human travelling patterns in social-based mobility
Understanding how humans move is a key factor for the design and evaluation of networking protocols and mobility management solutions in mobile networks. This is particularly true...
Chiara Boldrini, Marco Conti, Andrea Passarella
86
Voted
KAIS
2008
99views more  KAIS 2008»
15 years 15 days ago
Privacy-preserving SVM classification
Classical data mining algorithms implicitly assume complete access to all data, either in centralized or federated form. However, privacy and security concerns often prevent sharin...
Jaideep Vaidya, Hwanjo Yu, Xiaoqian Jiang
106
Voted
ISSAC
2007
Springer
132views Mathematics» more  ISSAC 2007»
15 years 6 months ago
Adaptive loops with kaapi on multicore and grid: applications in symmetric cryptography
The parallelization of two applications in symmetric cryptography is considered: block ciphering and a new method based on random sampling for the selection of basic substitution ...
Vincent Danjean, Roland Gillard, Serge Guelton, Je...
130
Voted
EDOC
2011
IEEE
14 years 9 days ago
Modeling Contextual Concerns in Enterprise Architecture
Abstract—Enterprise Architecture approaches are used to provide rigorous descriptions of the organization-wide environment, manage the alignment of deployed services to the organ...
Gonçalo Antunes, José Barateiro, Chr...