Sciweavers

2519 search results - page 467 / 504
» cost 2007
Sort
View
MOBISYS
2007
ACM
15 years 11 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
MOBIHOC
2007
ACM
15 years 11 months ago
Distributed opportunistic scheduling for ad-hoc communications: an optimal stopping approach
We consider distributed opportunistic scheduling (DOS) in wireless ad-hoc networks, where many links contend for the same channel using random access. In such networks, distribute...
Dong Zheng, Weiyan Ge, Junshan Zhang
SOSP
2007
ACM
15 years 8 months ago
VirtualPower: coordinated power management in virtualized enterprise systems
Power management has become increasingly necessary in large-scale datacenters to address costs and limitations in cooling or power delivery. This paper explores how to integrate p...
Ripal Nathuji, Karsten Schwan
ACSAC
2007
IEEE
15 years 6 months ago
Database Isolation and Filtering against Data Corruption Attacks
Various attacks (e.g., SQL injections) may corrupt data items in the database systems, which decreases the integrity level of the database. Intrusion detections systems are becomi...
Meng Yu, Wanyu Zang, Peng Liu
ACSAC
2007
IEEE
15 years 6 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...