Sciweavers

537 search results - page 78 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
DSN
2009
IEEE
15 years 5 months ago
Power supply induced common cause faults-experimental assessment of potential countermeasures
Fault-tolerant architectures based on physical replication of components are vulnerable to faults that cause the same effect in all replica. Short outages in a power supply shared...
Peter Tummeltshammer, Andreas Steininger
CIKM
2009
Springer
15 years 5 months ago
Privacy-enhanced public view for social graphs
We consider the problem of releasing a limited public view of a sensitive graph which reveals at least k edges per node. We are motivated by Facebook’s public search listings, w...
Hyoungshick Kim, Joseph Bonneau
DIM
2009
ACM
15 years 5 months ago
Mnikr: reputation construction through human trading of distributed social identities
Reputation forms an important part of how we come to trust people in face-to-face interactions, and thus situations involving trust online have come to realize that reputation is ...
Brendan Francis O'Connor, John Linwood Griffin
DSN
2007
IEEE
15 years 5 months ago
Improving Recoverability in Multi-tier Storage Systems
Enterprise storage systems typically contain multiple storage tiers, each having its own performance, reliability, and recoverability. The primary motivation for this multi-tier o...
Marcos Kawazoe Aguilera, Kimberly Keeton, Arif Mer...
ECUMN
2007
Springer
15 years 5 months ago
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Maryline Laurent-Maknavicius