Sciweavers

726 search results - page 112 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
EDBT
2008
ACM
111views Database» more  EDBT 2008»
14 years 8 months ago
Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond
Micro-data protection is a hot topic in the field of Statistical Disclosure Control (SDC), that has gained special interest after the disclosure of 658000 queries by the AOL searc...
Agusti Solanas, Francesc Sebé, Josep Doming...
ICC
2007
IEEE
148views Communications» more  ICC 2007»
14 years 2 months ago
A Rate Adaptive Transmission Opportunity for Fairness over IEEE 802.11e Wireless LANs
– The IEEE 802.11e is the extension to enhance the wireless Medium Access Control (MAC) Quality of Service (QoS) for applications requiring real time services. The IEEE 802.11b i...
Eunkyung Kim, Young-Joo Suh
ASAP
1997
IEEE
93views Hardware» more  ASAP 1997»
14 years 8 hour ago
A Novel Sequencer Hardware for Application Specific Computing
This paper introduces a powerful novel sequencer for controlling computational machines and for structured DMA (direct memory access) applications. It is mainly focused on applica...
Reiner W. Hartenstein, Jürgen Becker, Michael...
RTSS
2003
IEEE
14 years 1 months ago
Data Caches in Multitasking Hard Real-Time Systems
Data caches are essential in modern processors, bridging the widening gap between main memory and processor speeds. However, they yield very complex performance models, which make...
Xavier Vera, Björn Lisper, Jingling Xue
CCS
2009
ACM
14 years 2 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...