Sciweavers

1457 search results - page 255 / 292
» Privacy Challenges for Database Systems
Sort
View
DFN
2009
13 years 11 months ago
Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks
: While more and more applications require higher network bandwidth, there is also a tendency that large portions of this bandwidth are misused for dubious purposes, such as unauth...
Florian Mansmann, Fabian Fischer, Daniel A. Keim, ...
CORR
2010
Springer
169views Education» more  CORR 2010»
13 years 10 months ago
ElasTraS: An Elastic Transactional Data Store in the Cloud
Over the last couple of years, "Cloud Computing" or "Elastic Computing" has emerged as a compelling and successful paradigm for internet scale computing. One o...
Sudipto Das, Divyakant Agrawal, Amr El Abbadi
GEOINFORMATICA
2006
133views more  GEOINFORMATICA 2006»
13 years 10 months ago
Indexing Fast Moving Objects for kNN Queries Based on Nearest Landmarks
With the rapid advancements in positioning technologies such as the Global Positioning System (GPS) and wireless communications, the tracking of continuously moving objects has bec...
Dan Lin, Rui Zhang 0003, Aoying Zhou
PVLDB
2010
150views more  PVLDB 2010»
13 years 8 months ago
DataGarage: Warehousing Massive Performance Data on Commodity Servers
Contemporary datacenters house tens of thousands of servers. The servers are closely monitored for operating conditions and utilizations by collecting their performance data (e.g....
Charles Loboz, Slawek Smyl, Suman Nath
ICIP
2010
IEEE
13 years 8 months ago
Randomly driven fuzzy key extraction of unclonable images
In this paper, we develop an adjustable Fuzzy Extractor using the Physical Unclonable Functions (PUF) obtained by a common laser engraving method to sign physical objects. In part...
Saloomeh Shariati, Laurent Jacques, Françoi...