Sciweavers

2025 search results - page 61 / 405
» On the Utility of Inference Mechanisms
Sort
View
CCS
2010
ACM
13 years 8 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
ICC
2007
IEEE
146views Communications» more  ICC 2007»
14 years 3 months ago
Active Window Management: An Efficient Gateway Mechanism for TCP Traffic Control
—Many techniques have been proposed in the last few years to address performance degradations in end-to-end congestion control. Although these techniques require parameter tuning...
Mario Barbera, Alfio Lombardo, Carla Panarello, Gi...
ICEBE
2007
IEEE
115views Business» more  ICEBE 2007»
14 years 3 months ago
A Concurrent G-Negotiation Mechanism for Grid Resource Co-allocation
Since computationally intensive applications may often require more resources than a single computing machine can provide in one administrative domain, bolstering resource co-allo...
Benyun Shi, Kwang Mong Sim
HPDC
2003
IEEE
14 years 2 months ago
Resource-Aware Stream Management with the Customizable dproc Distributed Monitoring Mechanisms
Monitoring the resources of distributed systems is essential to the successful deployment and execution of grid applications, particularly when such applications have welldefined...
Sandip Agarwala, Christian Poellabauer, Jiantao Ko...
SISW
2003
IEEE
14 years 2 months ago
Decentralized Authentication Mechanisms for Object-based Storage Devices
Network-attached object-based storage separates data-path from control-path and enables direct interaction between clients and the storage devices. Clients interact with the file...
Vishal Kher, Yongdae Kim