Sciweavers

2631 search results - page 175 / 527
» Less is More
Sort
View
DAWAK
2006
Springer
14 years 2 months ago
Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures
Abstract. Individual privacy will be at risk if a published data set is not properly de-identified. k-anonymity is a major technique to de-identify a data set. A more general view ...
Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu...
SEC
2007
14 years 6 days ago
Building a Distributed Semantic-aware Security Architecture
Enhancing the service-oriented architecture paradigm with semantic components is a new field of research and goal of many ongoing projects. The results lead to more powerful web a...
Jan Kolter, Rolf Schillinger, Günther Pernul
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
13 years 10 months ago
An Agent-Based Best Effort Routing Technique for Load Balancing
Abstract. Several best effort schemes (next-hop routing) are used to transport the data in the Internet. Some of them do not perform flexible route computations to cope up with the...
Sunilkumar S. Manvi, Pallapa Venkataram
CN
2004
119views more  CN 2004»
13 years 10 months ago
On characterizing BGP routing table growth
The sizes of the BGP routing tables have increased by an order of magnitude over the last six years. This dramatic growth of the routing table can decrease the packet forwarding sp...
Tian Bu, Lixin Gao, Donald F. Towsley
SAC
2009
ACM
14 years 5 months ago
Extending Problem Frames to deal with stakeholder problems
The Problem Frames approach captures problems as seen by developers, but not by stakeholders. This paper presents a framework that extends the problem diagram of the Problem Frame...
An Agent, Goal-Oriented Approach