Sciweavers

2799 search results - page 473 / 560
» MAMS Service Framework
Sort
View
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
15 years 11 months ago
De-anonymizing Social Networks
Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and da...
Arvind Narayanan, Vitaly Shmatikov
CIKM
2009
Springer
15 years 11 months ago
A case study on model driven data integration for data centric software development
Model Driven Data Integration is a data integration approach that proactively incorporates and utilizes metadata across the data integration process. By decoupling data and metada...
Hyeonsook Kim, Ying Zhang, Samia Oussena, Tony Cla...
165
Voted
ESTIMEDIA
2009
Springer
15 years 11 months ago
QoS management of dynamic video tasks by task splitting and skipping
—We have integrated processing with deterministic and non-deterministic resource usage in an overall application and evaluated its performance on a multi-core processor platform....
Rob Albers, Eric Suijs, Peter H. N. de With
138
Voted
NORDSEC
2009
Springer
15 years 11 months ago
A Parallelism-Based Approach to Network Anonymization
Considering topologies of anonymous networks we used to organizing anonymous communications into hard to trace paths, composed of several middleman nodes, towards hiding communicat...
Igor Margasinski
DMSN
2009
ACM
15 years 11 months ago
Quality aware query scheduling in wireless sensor networks
We study query scheduling in Wireless Sensor Networks (WSNs) with a focus on two important metrics: Quality of Service (QoS) and Quality of Data (QoD). The motivation comes from o...
Hejun Wu, Qiong Luo, Jianjun Li, Alexandros Labrin...