Sciweavers

1352 search results - page 62 / 271
» Designing Security Requirements Models Through Planning
Sort
View
JSAC
2011
108views more  JSAC 2011»
13 years 3 months ago
A Model-Based Approach to Cognitive Radio Design
Abstract—Cognitive radio is a promising technology for fulfilling the spectrum and service requirements of future wireless communication systems. Real experimentation is a key f...
Jorg Lotze, Suhaib A. Fahmy, Juanjo Noguera, Linda...
SIGMOD
2009
ACM
228views Database» more  SIGMOD 2009»
14 years 9 months ago
Interactive anonymization of sensitive data
There has been much recent work on algorithms for limiting disclosure in data publishing. However, these algorithms have not been put to use in any comprehensive, usable toolkit f...
Xiaokui Xiao, Guozhang Wang, Johannes Gehrke
DMDW
2003
134views Management» more  DMDW 2003»
13 years 10 months ago
Using Design Guidelines to Improve Data Warehouse Logical Design
Data Warehouse-(DW) logical design often start with a conceptual schema and then generates relational structures. Applying this approach implies to cope with two main aspects: (i) ...
Verónika Peralta, Raul Ruggia
CONEXT
2006
ACM
13 years 10 months ago
Optimal design of high density 802.11 WLANs
Abstract: The provisioning of high throughput performance infrastructure wireless networks necessitates the deployment of a high density of Access Points. While the latter improves...
Vivek P. Mhatre, Konstantina Papagiannaki
ENTCS
2008
390views more  ENTCS 2008»
13 years 7 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel