Sciweavers

1316 search results - page 77 / 264
» A Computational Approach to Compare Information Revelation P...
Sort
View
SOSP
2007
ACM
14 years 6 months ago
VirtualPower: coordinated power management in virtualized enterprise systems
Power management has become increasingly necessary in large-scale datacenters to address costs and limitations in cooling or power delivery. This paper explores how to integrate p...
Ripal Nathuji, Karsten Schwan
SACMAT
2003
ACM
14 years 2 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
SIGCOMM
2009
ACM
14 years 3 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
ICDE
2007
IEEE
167views Database» more  ICDE 2007»
14 years 3 months ago
Load Shedding for Window Joins on Multiple Data Streams
We consider the problem of semantic load shedding for continuous queries containing window joins on multiple data streams and propose a robust approach that is effective with the ...
Yan-Nei Law, Carlo Zaniolo
ACSC
2009
IEEE
14 years 4 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank