Sciweavers

7596 search results - page 310 / 1520
» Challenges in forensic computing
Sort
View
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 7 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
INFOCOM
2012
IEEE
13 years 7 months ago
Scaling social media applications into geo-distributed clouds
—Federation of geo-distributed cloud services is a trend in cloud computing which, by spanning multiple data centers at different geographical locations, can provide a cloud plat...
Yu Wu, Chuan Wu, Bo Li 0001, Linquan Zhang, Zongpe...
PERCOM
2008
ACM
16 years 4 months ago
On-demand Video Streaming in Mobile Opportunistic Networks
Providing on-demand video streaming services to large numbers of nodes in mobile wireless networks is a challenging task. We propose MOVi (Mobile Opportunistic Video-on-demand), a...
Hayoung Yoon, JongWon Kim, Feiselia Tan, Robert Hs...
DATE
2009
IEEE
107views Hardware» more  DATE 2009»
15 years 11 months ago
Learning early-stage platform dimensioning from late-stage timing verification
— Today's innovations in the automotive sector are, to a great extent, based on electronics. The increasing integration complexity and stringent cost reduction goals turn E/...
Kai Richter, Marek Jersak, Rolf Ernst
111
Voted
IAT
2007
IEEE
15 years 11 months ago
A Multi-Phase Protocol for Negotiation with Interdependent Issues
— Multi-issue negotiations are a central component of many important coordination challenges. Almost all previous work in this area has assumed that negotiation issues are indepe...
Hiromitsu Hattori, Mark Klein, Takayuki Ito