Sciweavers

1356 search results - page 181 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
SDM
2009
SIAM
331views Data Mining» more  SDM 2009»
14 years 5 months ago
Privacy Preservation in Social Networks with Sensitive Edge Weights.
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of con...
Jie Wang, Jinze Liu, Jun Zhang, Lian Liu
GLVLSI
2003
IEEE
171views VLSI» more  GLVLSI 2003»
14 years 1 months ago
Combining wire swapping and spacing for low-power deep-submicron buses
We propose an approach for reducing the energy consumption of address buses that targets both the switching and the crosstalk components of power dissipation. The method is based ...
Enrico Macii, Massimo Poncino, Sabino Salerno
EUC
2005
Springer
14 years 1 months ago
A Hierarchical Anonymous Communication Protocol for Sensor Networks
Ensuring anonymity in sensor networks is a major security goal. Using traffic analysis, the attacker can compromise the network functionality by correlating data flow patterns to ...
Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Le...
MSWIM
2009
ACM
14 years 2 months ago
On providing location privacy for mobile sinks in wireless sensor networks
Wireless sensor networks have attracted increasing attentions considering their potentials for being widely adopted in both emerging civil and military applications. A common prac...
Edith C.-H. Ngai, Ioana Rodhe
EAGC
2003
Springer
14 years 1 months ago
Automatic Services Discovery, Monitoring and Visualization of Grid Environments: The MapCenter Approach
The complexity of Grid environments is growing as more projects and applications appear in this quick-evolving domain. Widespread applications are distributed over thousands of com...
Franck Bonnassieux, Robert Harakaly, Pascale Prime...