Sciweavers

1833 search results - page 61 / 367
» Mechanized Verification with Sharing
Sort
View
CSREASAM
2008
15 years 2 months ago
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing
Pervasive computing allows data to be collected using sensors and mobile devices. Recent studies, however, show that in emergency and crisis situations conventional access control ...
Danfeng Yao
IACR
2011
101views more  IACR 2011»
14 years 10 days ago
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
Companies, organizations, and individuals often wish to share information to realize valuable social and economic goals. Unfortunately, privacy concerns often stand in the way of ...
Emil Stefanov, Elaine Shi, Dawn Song
WETICE
2003
IEEE
15 years 6 months ago
WebDAVA: An Administrator-Free Approach To Web File-Sharing
Collaboration over the Internet depends on the ability of the members of a group to exchange data in a secure yet unobtrusive manner. WebDAVA is a system that allows users to deļ¬...
Alexander Levine, Vassilis Prevelakis, John Ioanni...
107
Voted
SYSTOR
2010
ACM
15 years 5 months ago
Design and implementation of a generic resource sharing virtual time dispatcher
Virtual machine monitors, especially when used for server consolidation, need to enforce a predefined sharing of resources among the running virtual machines. We propose a new me...
Tal Ben-Nun, Yoav Etsion, Dror G. Feitelson
PE
2006
Springer
91views Optimization» more  PE 2006»
15 years 18 days ago
Performance of peer-to-peer networks: Service capacity and role of resource sharing policies
In this paper we model and study the performance of peer-to-peer (P2P) file sharing systems in terms of their `service capacity'. We identify two regimes of interest: the tra...
Xiangying Yang, Gustavo de Veciana