Sciweavers

2310 search results - page 242 / 462
» Managing System and Active-Content Integrity
Sort
View
JSW
2007
90views more  JSW 2007»
13 years 8 months ago
Fine-Grained and Scalable Message Protection in Sensitive Organizations
Abstract— Today electronic messaging services are indispensable to individuals and organizations. If a message contains sensitive information, the integrity and confidentiality ...
Joon S. Park, Ganesh Devarajan
POLICY
2005
Springer
14 years 1 months ago
Relationship-Driven Policy Engineering for Autonomic Organisations
Autonomic systems are needed to self-manage the increasing complexity of pervasive communications access and the ubiquitous computing services it offers to humans. Policy based go...
Kevin Feeney, Karl Quinn, David Lewis, Declan O'Su...
SAC
2009
ACM
14 years 3 months ago
Impact of NVRAM write cache for file system metadata on I/O performance in embedded systems
File systems make use of part of DRAM as the buffer cache to enhance its performance in traditional systems. In this paper, we consider the use of Non-Volatile RAM (NVRAM) as a w...
In Hwan Doh, Hyo J. Lee, Young Je Moon, Eunsam Kim...
FORMATS
2007
Springer
14 years 3 days ago
Combining Formal Verification with Observed System Execution Behavior to Tune System Parameters
Resource limited DRE (Distributed Real-time Embedded) systems can benefit greatly from dynamic adaptation of system parameters. We propose a novel approach that employs iterative t...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...
KDD
2002
ACM
214views Data Mining» more  KDD 2002»
14 years 8 months ago
Privacy preserving association rule mining in vertically partitioned data
Privacy considerations often constrain data mining projects. This paper addresses the problem of association rule mining where transactions are distributed across sources. Each si...
Jaideep Vaidya, Chris Clifton