Sciweavers

3686 search results - page 375 / 738
» Comprehensive comprehensions
Sort
View
121
Voted
COLCOM
2008
IEEE
15 years 10 months ago
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering
Nowadays, increasing needs for information sharing arise due to extensive collaborations among organizations. Organizations desire to provide data access to their collaborators whi...
Fengjun Li, Bo Luo, Peng Liu, Anna Cinzia Squiccia...
151
Voted
CSE
2008
IEEE
15 years 10 months ago
Energy Model for H2S Monitoring Wireless Sensor Network
Abstract— Several applications have been proposed for Wireless sensor networks. These include habitat monitoring, structural health monitoring, pipeline (gas, water, and oil) mon...
Xiaojuan Chao, Waltenegus Dargie, Lin Guan
110
Voted
DSN
2008
IEEE
15 years 10 months ago
Analysis and solutions to issue queue process variation
The last few years have witnessed an unprecedented explosion in transistor densities. Diminutive feature sizes have enabled microprocessor designers to break the billion-transisto...
Niranjan Soundararajan, Aditya Yanamandra, Chrysos...
EDOC
2008
IEEE
15 years 10 months ago
Managing the Life Cycle of Access Rules in CEOSIS
The definition and management of access rules (e.g., to control the access to business documents and business functions) is an important task within any enterprise information sy...
Stefanie Rinderle-Ma, Manfred Reichert
GLOBECOM
2008
IEEE
15 years 10 months ago
Evaluating the Performance on ID/Loc Mapping
—Challenges of routing scalability has attracted many research efforts, represented by the works of splitting identifier and locator semantics of IP addresses. A group of identi...
Hong Zhang, Maoke Chen, Yuncheng Zhu