Sciweavers

125 search results - page 13 / 25
» Efficient techniques for realizing geo-spatial access contro...
Sort
View
PVLDB
2010
111views more  PVLDB 2010»
13 years 2 months ago
PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting
Recent legislation has increased the requirements of organizations to report data breaches, or unauthorized access to data. While access control policies are used to restrict acce...
Daniel Fabbri, Kristen LeFevre, Qiang Zhu
COMGEO
2011
ACM
12 years 11 months ago
Physical world as an internet of things
ABSTRACT . Categories and Subject Descriptors K. Computing Milieux K.m MISCELLANEOUS General Terms Theory Keywords Cyber-physics, Internet of Things, Quantum computing Cloud Comput...
Simon Berkovich
HASE
2007
IEEE
14 years 2 months ago
A Nonparametric Cusum Algorithm for Timeslot Sequences with Applications to Network Surveillance
We adapt the classic cusum change-point detection algorithm for applications to data network monitoring where various and numerous performance and reliability metrics are availabl...
Qi Zhang, Carlos Rendón, Veronica Montes De...
GECCO
2006
Springer
116views Optimization» more  GECCO 2006»
13 years 11 months ago
A crossover for complex building blocks overlapping
We propose a crossover method to combine complexly overlapping building blocks (BBs). Although there have been several techniques to identify linkage sets of loci o form a BB [4, ...
Miwako Tsuji, Masaharu Munetomo, Kiyoshi Akama
TWC
2008
154views more  TWC 2008»
13 years 7 months ago
MEERA: Cross-Layer Methodology for Energy Efficient Resource Allocation in Wireless Networks
Abstract-- In many portable devices, wireless network interfaces consume upwards of 30% of scarce system energy. Reducing the transceiver's power consumption to extend the sys...
Sofie Pollin, Rahul Mangharam, Bruno Bougard, Lies...