Sciweavers

5123 search results - page 104 / 1025
» Performance and Security Tradeoff
Sort
View
MSWIM
2000
ACM
15 years 8 months ago
Performance analysis of mobile agents for filtering data streams on wireless networks
Wireless networks are an ideal environment for mobile agents, because their mobility allows them to move across an unreliable link to reside on a wired host, next to or closer to ...
David Kotz, Guofei Jiang, Robert S. Gray, George C...
ICPP
1987
IEEE
15 years 8 months ago
Performance of VLSI Engines for Lattice Computations
Abstract. We address the problem of designing and building efficient custom Vl.Sl-besed processors to do computations on large multi-dimensional lattices. The design tradeoffs for ...
Steven D. Kugelmass, Kenneth Steiglitz, Richard K....
RTDB
1996
84views more  RTDB 1996»
15 years 5 months ago
Performance-Polymorphic Execution of Real-Time Queries
We are developing an object-oriented real-time database system that includes a relationally complete query language. Unlike conventional query optimizers, our optimizer estimates ...
Thomas Padron-McCarthy, Tore Risch
CSFW
2010
IEEE
15 years 8 months ago
Dynamic vs. Static Flow-Sensitive Security Analysis
—This paper seeks to answer fundamental questions about trade-offs between static and dynamic security analysis. It has been previously shown that flow-sensitive static informat...
Alejandro Russo, Andrei Sabelfeld
134
Voted
CCS
2008
ACM
15 years 6 months ago
Privacy-safe network trace sharing via secure queries
Privacy concerns relating to sharing network traces have traditionally been handled via sanitization, which includes removal of sensitive data and IP address anonymization. We arg...
Jelena Mirkovic