Sciweavers

7629 search results - page 1498 / 1526
» On the Performance of a Survivability Architecture for Netwo...
Sort
View
CCS
2004
ACM
14 years 1 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
KDD
2008
ACM
209views Data Mining» more  KDD 2008»
14 years 8 months ago
Combinational collaborative filtering for personalized community recommendation
Rapid growth in the amount of data available on social networking sites has made information retrieval increasingly challenging for users. In this paper, we propose a collaborativ...
WenYen Chen, Dong Zhang, Edward Y. Chang
INFOCOM
2007
IEEE
14 years 1 months ago
Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs
—One key adaptation mechanism often deployed in networking and computing systems is dynamic load balancing. The goal from employing dynamic load balancers is to ensure that the o...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
LCPC
2007
Springer
14 years 1 months ago
Multidimensional Blocking in UPC
Abstract. Partitioned Global Address Space (PGAS) languages offer an attractive, high-productivity programming model for programming large-scale parallel machines. PGAS languages, ...
Christopher Barton, Calin Cascaval, George Alm&aac...
WIOPT
2005
IEEE
14 years 1 months ago
Minimum Energy Transmission Scheduling Subject to Deadline Constraints
We consider the problem of transmission scheduling of data over a wireless fading channel with hard deadline constraints. Our system consists of N users, each with a fixed amount...
Alessandro Tarello, Jun Sun 0007, Murtaza Zafer, E...
« Prev « First page 1498 / 1526 Last » Next »