Sciweavers

569 search results - page 97 / 114
» Evaluating Cluster-based Network Servers
Sort
View
SACMAT
2006
ACM
14 years 3 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
PKDD
2004
Springer
277views Data Mining» more  PKDD 2004»
14 years 3 months ago
Scalable Density-Based Distributed Clustering
Clustering has become an increasingly important task in analysing huge amounts of data. Traditional applications require that all data has to be located at the site where it is scr...
Eshref Januzaj, Hans-Peter Kriegel, Martin Pfeifle
ICOIN
2001
Springer
14 years 2 months ago
A Proxy Caching Scheme for Continuous Media Streams on the Internet
The Internet has enabled the dissemination and access of vast amounts of information to be easy. But dramatic increases of the number of users of Internet cause server overload, n...
Eun-Ji Lim, Seong-Ho Park, Hyeon-Ok Hong, Ki-Dong ...
PET
2010
Springer
13 years 11 months ago
Achieving Efficient Query Privacy for Location Based Services
Mobile smartphone users frequently need to search for nearby points of interest from a location based service, but in a way that preserves the privacy of the users' locations...
Femi G. Olumofin, Piotr K. Tysowski, Ian Goldberg,...
PDPTA
2008
13 years 11 months ago
Predicting Web Cache Behavior using Stochastic State-Space Models
Web caches play an important role in improving the surfing experience of Web clients and reducing the network traffic seen by Web servers. Accurate analytical models of Web caches ...
Amitayu Das, Ritendra Datta, Bhuvan Urgaonkar, Ana...