Sciweavers

1356 search results - page 47 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
CCS
2011
ACM
12 years 8 months ago
How to break XML encryption
XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It ...
Tibor Jager, Somorovsky Juraj
KI
2007
Springer
14 years 2 months ago
Extracting Patterns of Individual Movement Behaviour from a Massive Collection of Tracked Positions
A EU-funded project GeoPKDD develops methods and tools for analysis of massive collections of movement data, which describe changes of spatial positions of discrete entities. Withi...
Gennady L. Andrienko, Natalia V. Andrienko
IPPS
2007
IEEE
14 years 2 months ago
VoroNet: A scalable object network based on Voronoi tessellations
In this paper, we propose the design of VoroNet, an objectbased peer to peer overlay network relying on Voronoi tessellations, along with its theoretical analysis and experimental...
Olivier Beaumont, Anne-Marie Kermarrec, Loris Marc...
HPDC
2010
IEEE
13 years 9 months ago
Reshaping text data for efficient processing on Amazon EC2
Text analysis tools are nowadays required to process increasingly large corpora which are often organized as small files (abstracts, news articles, etc). Cloud computing offers a ...
Gabriela Turcu, Ian T. Foster, Svetlozar Nestorov
SBACPAD
2003
IEEE
103views Hardware» more  SBACPAD 2003»
14 years 1 months ago
Profiling and Optimization of Software-Based Network-Analysis Applications
A large set of tools for network monitoring and accounting, security, traffic analysis and prediction — more broadly, for network operation and management — require direct and...
Loris Degioanni, Mario Baldi, Fulvio Risso, Gianlu...