Sciweavers

366 search results - page 47 / 74
» Access Policy Design Supported by FCA Methods
Sort
View
SIGCOMM
2009
ACM
14 years 3 months ago
SmartRE: an architecture for coordinated network-wide redundancy elimination
Application-independent Redundancy Elimination (RE), or identifying and removing repeated content from network transfers, has been used with great success for improving network pe...
Ashok Anand, Vyas Sekar, Aditya Akella
DIM
2005
ACM
13 years 10 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
GLOBECOM
2006
IEEE
14 years 2 months ago
Enhanced Per-Flow Admission Control and QoS Provisioning in IEEE 802.11e Wireless LANs
—The emerging IEEE 802.11e standard is expected to provide service differentiation and resource allocation for realtime traffic. To support the transmission of voice and multime...
Yi Liu, Chadi Assi, Anjali Agarwal
CIDR
2007
177views Algorithms» more  CIDR 2007»
13 years 10 months ago
bdbms - A Database Management System for Biological Data
Biologists are increasingly using databases for storing and managing their data. Biological databases typically consist of a mixture of raw data, metadata, sequences, annotations,...
Mohamed Y. Eltabakh, Mourad Ouzzani, Walid G. Aref
WWW
2006
ACM
14 years 9 months ago
Protecting browser state from web privacy attacks
Through a variety of means, including a range of browser cache methods and inspecting the color of a visited hyperlink, client-side browser state can be exploited to track users a...
Collin Jackson, Andrew Bortz, Dan Boneh, John C. M...