Sciweavers

1456 search results - page 93 / 292
» Keeping encountered information
Sort
View
141
Voted
SISW
2005
IEEE
15 years 7 months ago
File System Design with Assured Delete
This paper describes a system that supports high availability of data, until the data should be expunged, at which time it is impossible to recover the data. This design supports ...
Radia J. Perlman
STORAGESS
2005
ACM
15 years 7 months ago
Storage-based file system integrity checker
In this paper we present a storage based intrusion detection system (IDS) which uses time and space efficient point-intime copy and performs file system integrity checks to detec...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...
CAISE
2005
Springer
15 years 7 months ago
A Metagraph View-Based Approach to Multi-firm Process Coordination
The structural details of a firm’s business processes are traditionally inaccessible to entities outside the firm. However, as firms move towards tighter coordination of process...
Amit Basu
ICCNMC
2005
Springer
15 years 7 months ago
A Prediction-Based Location Update Algorithm in Wireless Mobile Ad-Hoc Networks
Location information in Mobile Ad Hoc Networks (MANETs) provides efficiency to uni-cast and multi-cast algorithms. This paper proposes a new location update algorithm called PLU. T...
Jun Shen, Kun Yang, Shaochun Zhong
ISW
2005
Springer
15 years 7 months ago
A Privacy Preserving Rental System
Abstract. Rental records contain much sensitive information on individuals, so if abused by the rental service providers, user privacy could be jeopardized. To mitigate this concer...
Yanjiang Yang, Beng Chin Ooi