Sciweavers

726 search results - page 83 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
STORAGESS
2005
ACM
14 years 1 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
WMASH
2003
ACM
14 years 29 days ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
CEAS
2008
Springer
13 years 9 months ago
On Free Speech and Civil Discourse: Filtering Abuse in Blog Comments
Internet blogs provide forums for discussions within virtual communities, allowing readers to post comments on what they read. However, such comments may contain abuse, such as pe...
D. Sculley
MOBISYS
2007
ACM
14 years 7 months ago
Improving mobile database access over wide-area networks without degrading consistency
We report on the design, implementation, and evaluation of a system called Cedar that enables mobile database access with good performance over low-bandwidth networks. This is acc...
Niraj Tolia, Mahadev Satyanarayanan, Adam Wolbach
MM
1994
ACM
94views Multimedia» more  MM 1994»
13 years 11 months ago
A Statistical Admission Control Algorithm for Multimedia Servers
A large-scale multimedia server, in practice, has to service a large number of clients simultaneously. Given the real-time requirements of each client and the fixed data transfer ...
Harrick M. Vin, Pawan Goyal, Alok Goyal