Sciweavers

339 search results - page 45 / 68
» Using Utility to Provision Storage Systems
Sort
View
91
Voted
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
15 years 4 months ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...
100
Voted
WWW
2010
ACM
15 years 5 months ago
Distributing private data in challenged network environments
Developing countries face significant challenges in network access, making even simple network tasks unpleasant. Many standard techniques—caching and predictive prefetching— ...
Azarias Reda, Brian D. Noble, Yidnekachew Haile
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 19 days ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
80
Voted
JCDL
2004
ACM
151views Education» more  JCDL 2004»
15 years 3 months ago
Automatic organization for digital photographs with geographic coordinates
We describe PhotoCompas, a system that utilizes the time and location information embedded in digital photographs to automatically organize a personal photo collection. PhotoCompa...
Mor Naaman, Yee Jiun Song, Andreas Paepcke, Hector...
HICSS
2005
IEEE
154views Biometrics» more  HICSS 2005»
15 years 3 months ago
A Metadata Model for Electronic Images
Finding images over the internet can be trying at best. Many industries such as advertising, marketing, image consultants, print media, and medical imaging deal with electronic im...
Regina M. Mathis, Lucinda Caughey