Sciweavers

976 search results - page 78 / 196
» Evaluating Adversarial Partitions
Sort
View
110
Voted
VEE
2005
ACM
140views Virtualization» more  VEE 2005»
15 years 6 months ago
Planning for code buffer management in distributed virtual execution environments
Virtual execution environments have become increasingly useful in system implementation, with dynamic translation techniques being an important component for performance-critical ...
Shukang Zhou, Bruce R. Childers, Mary Lou Soffa
111
Voted
HIPEAC
2009
Springer
15 years 3 months ago
Accomodating Diversity in CMPs with Heterogeneous Frequencies
Shrinking process technologies and growing chip sizes have profound effects on process variation. This leads to Chip Multiprocessors (CMPs) where not all cores operate at maximum f...
Major Bhadauria, Vincent M. Weaver, Sally A. McKee
133
Voted
SIGMOD
2010
ACM
243views Database» more  SIGMOD 2010»
15 years 25 days ago
Non-homogeneous generalization in privacy preserving data publishing
Most previous research on privacy-preserving data publishing, based on the k-anonymity model, has followed the simplistic approach of homogeneously giving the same generalized val...
Wai Kit Wong, Nikos Mamoulis, David Wai-Lok Cheung
AAAI
2000
15 years 2 months ago
Generalizing Boundary Points
The complexity of numerical domain partitioning depends on the number of potential cut points. In multiway partitioning this dependency is often quadratic, even exponential. There...
Tapio Elomaa, Juho Rousu
73
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
The Directional Attack on Wireless Localization -or- How to Spoof Your Location with a Tin Can
—802.11 localization algorithms provide the ability to accurately position and track wireless clients thereby enabling location-based services and applications. However, we show ...
Kevin S. Bauer, Damon McCoy, Eric W. Anderson, Mar...