Sciweavers

1763 search results - page 126 / 353
» Scientific Data Collections and Distributed Collective Pract...
Sort
View
113
Voted
VEE
2005
ACM
218views Virtualization» more  VEE 2005»
15 years 6 months ago
The pauseless GC algorithm
Modern transactional response-time sensitive applications have run into practical limits on the size of garbage collected heaps. The heap can only grow until GC pauses exceed the ...
Cliff Click, Gil Tene, Michael Wolf
98
Voted
ADC
2009
Springer
175views Database» more  ADC 2009»
15 years 7 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
IPM
2008
139views more  IPM 2008»
15 years 23 days ago
Complex adaptive filtering user profile using graphical models
This article explores how to develop complex data driven user models that go beyond the bag of words model and topical relevance. We propose to learn from rich user specific info...
Yi Zhang 0001
108
Voted
CRYPTO
2012
Springer
241views Cryptology» more  CRYPTO 2012»
13 years 3 months ago
Crowd-Blending Privacy
We introduce a new definition of privacy called crowd-blending privacy that strictly relaxes the notion of differential privacy. Roughly speaking, k-crowd blending private saniti...
Johannes Gehrke, Michael Hay, Edward Lui, Rafael P...
98
Voted
TIT
2008
73views more  TIT 2008»
15 years 20 days ago
Detection of Information Flows
Abstract-- Distributed detection of information flows by timing analysis is considered. Timing measurements are subject to perturbations and the insertion of chaff noise. Moreover,...
Ting He, Lang Tong