Sciweavers

2009 search results - page 331 / 402
» A privacy-aware access control system
Sort
View
HPCA
1996
IEEE
13 years 12 months ago
Protected, User-Level DMA for the SHRIMP Network Interface
Traditional DMA requires the operating system to perform many tasks to initiate a transfer, with overhead on the order of hundreds or thousands of CPU instructions. This paper des...
Matthias A. Blumrich, Cezary Dubnicki, Edward W. F...
CCS
2010
ACM
13 years 11 months ago
Data protection in outsourcing scenarios: issues and directions
Data outsourcing is an emerging paradigm that allows users and companies to give their (potentially sensitive) data to external servers that then become responsible for their stor...
Pierangela Samarati, Sabrina De Capitani di Vimerc...
AIME
2007
Springer
13 years 11 months ago
An Experiment in Automatic Classification of Pathological Reports
Abstract. Medical reports are predominantly written in natural language; as such they are not computer-accessible. A common way to make medical narrative accessible to automated sy...
Janneke van der Zwaan, Erik F. Tjong Kim Sang, Maa...
DSN
2004
IEEE
13 years 11 months ago
A Decentralized Algorithm for Erasure-Coded Virtual Disks
A Federated Array of Bricks is a scalable distributed storage system composed from inexpensive storage bricks. It achieves high reliability with low cost by using erasure coding a...
Svend Frølund, Arif Merchant, Yasushi Saito...
DEXA
2006
Springer
121views Database» more  DEXA 2006»
13 years 11 months ago
DCF: An Efficient Data Stream Clustering Framework for Streaming Applications
Streaming applications, such as environment monitoring and vehicle location tracking require handling high volumes of continuously arriving data and sudden fluctuations in these vo...
Kyungmin Cho, SungJae Jo, Hyukjae Jang, Su Myeon K...