Sciweavers

21 search results - page 4 / 5
» Obfuscation of sensitive data in network flows
Sort
View
INFOCOM
2010
IEEE
13 years 4 months ago
Coupled 802.11 Flows in Urban Channels: Model and Experimental Evaluation
Abstract—Contending flows in multi-hop 802.11 wireless networks compete with two fundamental asymmetries: (i) channel asymmetry, in which one flow has a stronger signal, potent...
Joseph Camp, Ehsan Aryafar, Edward W. Knightly
BPSC
2009
190views Business» more  BPSC 2009»
13 years 7 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann
SC
1992
ACM
13 years 10 months ago
The Distributed Virtual Windtunnel
An implementation of a distributed virtual environment for the shared interactive visualization of large unsteady three-dimensional flowfields is described. Computation of the vis...
Steve Bryson, Michael J. Gerald-Yamasaki
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
14 years 1 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...
MM
2010
ACM
148views Multimedia» more  MM 2010»
13 years 6 months ago
RAPID: a reliable protocol for improving delay
Recently, there has been a dramatic increase in interactive cloud based software applications (e.g. working on remote machines, online games, interactive websites such as financia...
Sanjeev Mehrotra, Jin Li, Cheng Huang