Sciweavers

5344 search results - page 262 / 1069
» Privacy-Preserving Set Operations
Sort
View
147
Voted
ICALP
2007
Springer
15 years 10 months ago
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories
Motivated by the challenging task of designing “secure” vote storage mechanisms, we study information storage mechanisms that operate in extremely hostile environments. In suc...
Tal Moran, Moni Naor, Gil Segev
OR
2007
Springer
15 years 10 months ago
A Decision Support System for Planning Promotion Time Slots
We report on the development of a Decision Support System (DSS) to plan the best assignment for the weekly promotion space of a TV station. Each product to promote has a given tar...
Paulo A. Pereira, Fernando A. C. C. Fontes, Dalila...
RAID
2007
Springer
15 years 10 months ago
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware
Abstract. In this work we present a NIDS cluster as a scalable solution for realizing high-performance, stateful network intrusion detection on commodity hardware. The design addre...
Matthias Vallentin, Robin Sommer, Jason Lee, Craig...
ICDCS
2006
IEEE
15 years 10 months ago
A Hierarchical Optimization Framework for Autonomic Performance Management of Distributed Computing Systems
This paper develops a scalable online optimization framework for the autonomic performance management of distributed computing systems operating in a dynamic environment to satisf...
Nagarajan Kandasamy, Sherif Abdelwahed, Mohit Khan...
IISWC
2006
IEEE
15 years 10 months ago
Characterization of Scientific Workloads on Systems with Multi-Core Processors
Multi-core processors are planned for virtually all next-generation HPC systems. In a preliminary evaluation of AMD Opteron Dual-Core processor systems, we investigated the scaling...
Sadaf R. Alam, Richard F. Barrett, Jeffery A. Kueh...