Sciweavers

21 search results - page 4 / 5
» Obfuscation of sensitive data in network flows
Sort
View
71
Voted
INFOCOM
2010
IEEE
14 years 8 months ago
Coupled 802.11 Flows in Urban Channels: Model and Experimental Evaluation
Abstract—Contending flows in multi-hop 802.11 wireless networks compete with two fundamental asymmetries: (i) channel asymmetry, in which one flow has a stronger signal, potent...
Joseph Camp, Ehsan Aryafar, Edward W. Knightly
BPSC
2009
190views Business» more  BPSC 2009»
14 years 10 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann
SC
1992
ACM
15 years 1 months ago
The Distributed Virtual Windtunnel
An implementation of a distributed virtual environment for the shared interactive visualization of large unsteady three-dimensional flowfields is described. Computation of the vis...
Steve Bryson, Michael J. Gerald-Yamasaki
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
15 years 4 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...
MM
2010
ACM
148views Multimedia» more  MM 2010»
14 years 9 months ago
RAPID: a reliable protocol for improving delay
Recently, there has been a dramatic increase in interactive cloud based software applications (e.g. working on remote machines, online games, interactive websites such as financia...
Sanjeev Mehrotra, Jin Li, Cheng Huang