Sciweavers

294 search results - page 53 / 59
» Conflict Analysis for Management Policies
Sort
View
CCS
2007
ACM
14 years 1 months ago
Preserving privacy in gps traces via uncertainty-aware path cloaking
Motivated by a probe-vehicle based automotive traffic monitoring system, this paper considers the problem of guaranteed anonymity in a dataset of location traces while maintainin...
Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabad...
JSSPP
2007
Springer
14 years 1 months ago
A Self-optimized Job Scheduler for Heterogeneous Server Clusters
Heterogeneous clusters and grid infrastructures are becoming increasingly popular. In these computing infrastructures, machines have different resources, including memory sizes, d...
Elad Yom-Tov, Yariv Aridor
WPES
2005
ACM
14 years 1 months ago
Secure off-the-record messaging
At the 2004 Workshop on Privacy in the Electronic Society (WPES), Borisov, Goldberg and Brewer, presented “Off the Record Messaging” (OTR), a protocol designed to add endto-e...
Mario Di Raimondo, Rosario Gennaro, Hugo Krawczyk
POS
1998
Springer
13 years 12 months ago
Optimizing the Read and Write Barriers for Orthogonal Persistence
Persistent programming languages manage volatile memory as a cache for stable storage, imposing a read barrier on operations that access the cache, and a write barrier on updates ...
Antony L. Hosking, Nathaniel Nystrom, Quintin I. C...
WSC
2008
13 years 10 months ago
Parallel discrete-event simulation of population dynamics
Research in parallel simulation has been around for more than two decades. However, the number of papers reporting on its application to real world problems is limited. At the 200...
Bhakti Satyabudhi, Stephan Onggo