Sciweavers

1477 search results - page 207 / 296
» Scalable Management
Sort
View
DATE
2006
IEEE
100views Hardware» more  DATE 2006»
15 years 11 months ago
Simulation and analysis of network on chip architectures: ring, spidergon and 2D mesh
NoC architectures can be adopted to support general communications among multiple IPs over multi-processor Systems on Chip (SoCs). In this work we illustrate the modeling and simu...
Luciano Bononi, Nicola Concer
172
Voted
DAWAK
2006
Springer
15 years 8 months ago
Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures
Abstract. Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. A more general view ...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
DFN
2009
15 years 6 months ago
Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks
: While more and more applications require higher network bandwidth, there is also a tendency that large portions of this bandwidth are misused for dubious purposes, such as unauth...
Florian Mansmann, Fabian Fischer, Daniel A. Keim, ...
IEEEARES
2010
IEEE
15 years 12 months ago
Strategies for Reducing Risks of Inconsistencies in Access Control Policies
—Managing access control policies is a complex task. We argue that much of the complexity is unnecessary and mostly due to historical reasons. There are number of legacy policy s...
Bernard Stepien, Stan Matwin, Amy P. Felty
IEEESCC
2009
IEEE
15 years 11 months ago
JabberWocky: Crowd-Sourcing Metadata for Files
Finding relevant files in a personal file system continues to be a challenge. It is still easier to find stuff on the Web with its exponential growth than in one’s personal ...
Varun Bhagwan, Carlos Maltzahn