Sciweavers

219 search results - page 6 / 44
» Privacy in Distributed Meeting Scheduling
Sort
View
ICPP
2009
IEEE
14 years 1 months ago
Integrated Performance Views in Charm++: Projections Meets TAU
Abstract—The Charm++ parallel programming system provides a modular performance interface that can be used to extend its performance measurement and analysis capabilities. The in...
Scott Biersdorff, Chee Wai Lee, Allen D. Malony, L...
CCS
2003
ACM
13 years 10 months ago
LEAP: efficient security mechanisms for large-scale distributed sensor networks
We describe LEAP (Localized Encryption and Authentication Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the ...
Sencun Zhu, Sanjeev Setia, Sushil Jajodia
CAV
2009
Springer
116views Hardware» more  CAV 2009»
13 years 11 months ago
Priority Scheduling of Distributed Systems Based on Model Checking
Priorities are used to control the execution of systems to meet given requirements for optimal use of resources, e.g., by using scheduling policies. For distributed systems, it is ...
Ananda Basu, Saddek Bensalem, Doron Peled, Joseph ...
WORDS
2002
IEEE
13 years 11 months ago
Middleware Scheduling Optimization Techniques for Distributed Real-Time and Embedded Systems
Developers of mission-critical distributed real-time and embedded (DRE) systems face a fundamental tension between (1) the performance gains achievable with hand-crafted optimizat...
Christopher D. Gill, Ron Cytron, Douglas C. Schmid...
DMIN
2006
138views Data Mining» more  DMIN 2006»
13 years 8 months ago
Quantification of a Privacy Preserving Data Mining Transformation
Data mining, with its promise to extract valuable, previously unknown and potentially useful patterns or knowledge from large data sets that contain private information is vulnerab...
Mohammed Ketel