Sciweavers

1358 search results - page 215 / 272
» Diverse Firewall Design
Sort
View
TDSC
2011
14 years 6 months ago
CASTLE: Continuously Anonymizing Data Streams
— Most of existing privacy preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are cont...
Jianneng Cao, Barbara Carminati, Elena Ferrari, Ki...
HOTNETS
2010
14 years 6 months ago
CloudPolice: taking access control out of the network
Cloud computing environments impose new challenges on access control techniques due to multi-tenancy, the growing scale and dynamicity of hosts within the cloud infrastructure, an...
Lucian Popa 0002, Minlan Yu, Steven Y. Ko, Sylvia ...
TCOM
2010
63views more  TCOM 2010»
14 years 6 months ago
Efficiently decoded full-rate space-time block codes
Space-time block codes with orthogonal structures typically provide full-diversity reception and simple receiver processing. However, rate-1 orthogonal codes for complex constellat...
Don J. Torrieri, Matthew C. Valenti
ICASSP
2011
IEEE
14 years 3 months ago
User selection schemes for maximizing throughput of multiuser MIMO systems using Zero Forcing Beamforming
The performance of a multiuser MIMO broadcast system depends highly on how the users being served are selected from the pool of users requesting service. Though dirty paper coding...
Anh H. Nguyen, Bhaskar D. Rao
CHI
2011
ACM
14 years 3 months ago
Homebrew databases: complexities of everyday information management in nonprofit organizations
Many people manage a complex assortment of digital information in their lives. Volunteer coordinators at nonprofit organizations are no exception; they collectively manage informa...
Amy Voida, Ellie Harmon, Ban Al-Ani