Sciweavers

262 search results - page 44 / 53
» Managing Home Care Networks
Sort
View
HASE
2008
IEEE
13 years 8 months ago
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...

Publication
164views
13 years 7 months ago
Kangaroo: Video Seeking in P2P Systems
A key challenge faced by peer-to-peer(P2P) video-on- demand (VoD) systems is their ability, or lack thereof, to provide DVD-like functionality, such as pause, forward and backward ...
Xiaoyuan Yang, Minas Gjoka, Parminder Chhabra, Ath...
SIGMETRICS
2011
ACM
182views Hardware» more  SIGMETRICS 2011»
12 years 10 months ago
Fine-grained latency and loss measurements in the presence of reordering
Modern trading and cluster applications require microsecond latencies and almost no losses in data centers. This paper introduces an algorithm called FineComb that can estimate ï¬...
Myungjin Lee, Sharon Goldberg, Ramana Rao Kompella...
MOBICOM
2005
ACM
14 years 1 months ago
Architecture and evaluation of an unplanned 802.11b mesh network
This paper evaluates the ability of a wireless mesh architecture to provide high performance Internet access while demanding little deployment planning or operational management. ...
John C. Bicket, Daniel Aguayo, Sanjit Biswas, Robe...
ICDE
2008
IEEE
150views Database» more  ICDE 2008»
14 years 8 months ago
Link Privacy in Social Networks
We consider a privacy threat to a social network in which the goal of an attacker is to obtain knowledge of a significant fraction of the links in the network. We formalize the ty...
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nab...