Sciweavers

808 search results - page 93 / 162
» Distributed Anonymization: Achieving Privacy for Both Data S...
Sort
View
CCGRID
2010
IEEE
13 years 9 months ago
A Map-Reduce System with an Alternate API for Multi-core Environments
Map-reduce framework has received a significant attention and is being used for programming both large-scale clusters and multi-core systems. While the high productivity aspect of ...
Wei Jiang, Vignesh T. Ravi, Gagan Agrawal
CN
2007
122views more  CN 2007»
13 years 7 months ago
Impact of mobility on the performance of relaying in ad hoc networks - Extended version
— We consider a mobile ad hoc network consisting of three types of nodes: source, destination, and relay nodes. All the nodes are moving over a bounded region with possibly diffe...
Ahmad Al Hanbali, Arzad Alam Kherani, Robin Groene...
CCS
2009
ACM
13 years 11 months ago
Filter-resistant code injection on ARM
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...
ICIS
2003
13 years 9 months ago
The Economics of Telecommuting: Theory and Evidence
While there has been considerable research on the effect of telecommuting on worker’s productivity and quality of work life, there is considerably less work on the managerial pr...
Guodong Gao, Lorin M. Hitt
BIRTE
2006
139views Business» more  BIRTE 2006»
13 years 11 months ago
Quality Contracts for Real-Time Enterprises
Real-time enterprises rely on user queries being answered in a timely fashion and using fresh data. This is relatively easy when systems are lightly loaded and both queries and upd...
Alexandros Labrinidis, Huiming Qu, Jie Xu