Sciweavers

295 search results - page 53 / 59
» Differentially-private network trace analysis
Sort
View
MICRO
2008
IEEE
131views Hardware» more  MICRO 2008»
14 years 4 months ago
Token flow control
As companies move towards many-core chips, an efficient onchip communication fabric to connect these cores assumes critical importance. To address limitations to wire delay scala...
Amit Kumar 0002, Li-Shiuan Peh, Niraj K. Jha
IADIS
2003
13 years 11 months ago
Scalability of Cooperative Algorithms for Distributed Architectures of Proxy Servers
Systems consisting of multiple proxy servers are a popular solution to deal with performance and network resource utilization problems related to the growth of the Web numbers. Af...
Riccardo Lancellotti, Francesca Mazzoni, Michele C...
ICMCS
2007
IEEE
131views Multimedia» more  ICMCS 2007»
14 years 4 months ago
Image Source Coding Forensics via Intrinsic Fingerprints
In this digital era, digital multimedia contents are often transmitted over networks without any protection. This raises serious security concerns since the receivers/subscribers ...
Wan-Yi Sabrina Lin, Steven Tjoa, H. Vicky Zhao, K....
MM
2006
ACM
184views Multimedia» more  MM 2006»
14 years 4 months ago
Extraction of social context and application to personal multimedia exploration
Personal media collections are often viewed and managed along the social dimension, the places we spend time at and the people we see, thus tools for extracting and using this inf...
Brett Adams, Dinh Q. Phung, Svetha Venkatesh
POLICY
2005
Springer
14 years 3 months ago
Using Linear Temporal Model Checking for Goal-Oriented Policy Refinement Frameworks
Policy refinement is meant to derive lower-level policies from higher-level ones so that these more specific policies are better suited for use in different execution environments...
Javier Rubio-Loyola, Joan Serrat, Marinos Charalam...