Sciweavers

9095 search results - page 1699 / 1819
» Service RT Systems
Sort
View
SJ
2010
136views more  SJ 2010»
14 years 11 months ago
Optimizing the Migration to Future-Generation Passive Optical Networks (PON)
We study the upgrading problem of existing Passive Optical Networks (PONs) that need to increase their capacity at different points in time. Our method upgrades line rates and migr...
M. De Andrade, Massimo Tornatore, S. Sallent, Bisw...
TDP
2010
189views more  TDP 2010»
14 years 11 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...
ICDE
2011
IEEE
380views Database» more  ICDE 2011»
14 years 8 months ago
Influence Zone: Efficiently Processing Reverse k Nearest Neighbors Queries
Given a set of objects and a query q, a point p is called the reverse k nearest neighbor (RkNN) of q if q is one of the k closest objects of p. In this paper, we introduce the c...
Muhammad Aamir Cheema, Xuemin Lin, Wenjie Zhang, Y...
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
14 years 7 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
AINA
2011
IEEE
14 years 7 months ago
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence
—The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security po...
Julian Schütte, Stephan Heuser
« Prev « First page 1699 / 1819 Last » Next »