Sciweavers

3452 search results - page 601 / 691
» Secure Data Outsourcing
Sort
View
125
Voted
ESORICS
2010
Springer
15 years 1 months ago
Web Browser History Detection as a Real-World Privacy Threat
Web browser history detection using CSS visited styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with br...
Artur Janc, Lukasz Olejnik
SIGCOMM
2010
ACM
15 years 26 days ago
Cloudward bound: planning for beneficial migration of enterprise applications to the cloud
In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in th...
Mohammad Y. Hajjat, Xin Sun, Yu-Wei Eric Sung, Dav...
105
Voted
IDT
2008
123views more  IDT 2008»
15 years 22 days ago
A rich semantic model of track as a foundation for sharing beliefs regarding dynamic objects and events
: Many defense, homeland security, and commercial security objectives require continuous tracking of mobile entities such as aircraft. The systems that perform these functions prod...
Frederick Hayes-Roth, Curtis L. Blais
CCR
2007
135views more  CCR 2007»
15 years 20 days ago
Future internet: fundamentals and measurement
While the Internet is hardly “broken”, it has proved unable to integrate new ideas, new architectures, and provide paths for future integration of data, voice, rich media and ...
Thrasyvoulos Spyropoulos, Serge Fdida, Scott Kirkp...
115
Voted
JPDC
2006
81views more  JPDC 2006»
15 years 19 days ago
Implications of virtualization on Grids for high energy physics applications
The simulations used in the field of high energy physics are compute intensive and exhibit a high level of data parallelism. These features make such simulations ideal candidates ...
Laura Gilbert, Jeff Tseng, Rhys Newman, Saeed Iqba...