Sciweavers

539 search results - page 65 / 108
» Modeling Network Contention Effects on All-to-All Operations
Sort
View
DGO
2004
112views Education» more  DGO 2004»
15 years 1 months ago
Exploration and Exploitation: Knowledge Sharing in Digital Government Projects
This paper examines knowledge sharing processes in digital government projects (DGPs). Although knowledge sharing processes are a central feature of the functioning of government,...
Maria Christina Binz-Scharf
CONEXT
2009
ACM
15 years 27 days ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...
WICON
2008
15 years 1 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
USS
2008
15 years 2 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
ISCAS
2006
IEEE
108views Hardware» more  ISCAS 2006»
15 years 5 months ago
Design methodology for global resonant H-tree clock distribution networks
Abstract—Design guidelines for resonant H-tree clock distribution networks are presented in this paper. A distributed model of a two-level resonant H-tree structure is described,...
Jonathan Rosenfeld, Eby G. Friedman