Sciweavers

948 search results - page 145 / 190
» Analysis of SITA policies
Sort
View
EWSN
2007
Springer
15 years 11 months ago
Multithreading Optimization Techniques for Sensor Network Operating Systems
While a multithreading approach provides a convenient sensor application developing environment with automatic control flow and stack managment, it is considered to have a larger d...
Hyoseung Kim, Hojung Cha
CCS
2010
ACM
15 years 6 months ago
Toward practical authorization-dependent user obligation systems
Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be u...
Murillo Pontual, Omar Chowdhury, William H. Winsbo...
EDBTW
2010
Springer
15 years 6 months ago
Toward a software development methodology for anonymity applications
There are some software applications especially in privacy protection domain which they need anonymity support. Therefore lots of methods and protocols have been presented so far ...
Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shari...
DAC
2009
ACM
15 years 6 months ago
Throughput optimal task allocation under thermal constraints for multi-core processors
It is known that temperature gradients and thermal hotspots affect the reliability of microprocessors. Temperature is also an important constraint when maximizing the performance...
Vinay Hanumaiah, Ravishankar Rao, Sarma B. K. Vrud...
CCS
2009
ACM
15 years 6 months ago
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, servic...
Jessica Staddon