Sciweavers

8118 search results - page 1560 / 1624
» The Newton Application Architecture
Sort
View
176
Voted
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 7 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
122
Voted
XPU
2007
Springer
15 years 7 months ago
Empirical Evidence Principle and Joint Engagement Practice to Introduce XP
Bringing software process change to an organisation is a real challenge. The authors have shown a sample attempt to carry out a process change and then reflected on its results and...
Lech Madeyski, Wojciech Biela
ACSAC
2006
IEEE
15 years 7 months ago
Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software
Address space randomization is an emerging and promising method for stopping a broad range of memory corruption attacks. By randomly shifting critical memory regions at process in...
Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, ...
BROADNETS
2006
IEEE
15 years 7 months ago
A Flexible Advance Reservation Model for Multi-Domain WDM Optical Networks
— Advance reservation is a mechanism to guarantee the availability of resources when they are needed. In the context of LambdaGrid, this mechanism is used to provide data-intensi...
Eric He, Xi Wang, Jason Leigh
DATE
2006
IEEE
78views Hardware» more  DATE 2006»
15 years 7 months ago
Wireless sensor networks and beyond
—Wireless Sensor Networks provide opportunities even outside their usual application domain of environmental monitoring. In this paper we present a case study on the use of Wirel...
Paul J. M. Havinga
« Prev « First page 1560 / 1624 Last » Next »