Sciweavers

1625 search results - page 229 / 325
» Privacy-preserving data publishing
Sort
View
128
Voted
IUI
2005
ACM
15 years 9 months ago
TaskTracer: a desktop environment to support multi-tasking knowledge workers
This paper reports on TaskTracer — a software system being designed to help highly multitasking knowledge workers rapidly locate, discover, and reuse past processes they used to...
Anton N. Dragunov, Thomas G. Dietterich, Kevin Joh...
CCS
2005
ACM
15 years 9 months ago
Improving Brumley and Boneh timing attack on unprotected SSL implementations
Since the remarkable work of Kocher [7], several papers considering different types of timing attacks have been published. In 2003, Brumley and Boneh presented a timing attack on...
Onur Aciiçmez, Werner Schindler, Çet...
ESTIMEDIA
2005
Springer
15 years 9 months ago
Scratchpad Sharing Strategies for Multiprocess Embedded Systems: A First Approach
Portable embedded systems require diligence in managing their energy consumption. Thus, power efficient processors coupled with onchip memories (e.g. caches, scratchpads) are the...
Manish Verma, Klaus Petzold, Lars Wehmeyer, Heiko ...
ICCSA
2005
Springer
15 years 9 months ago
Resource and Service Discovery in the iGrid Information Service
In this paper we describe resource and service discovery mechanisms available in iGrid, a novel Grid Information Service based on the relational model. iGrid is developed within th...
Giovanni Aloisio, Massimo Cafaro, Italo Epicoco, S...
159
Voted
PKDD
2005
Springer
155views Data Mining» more  PKDD 2005»
15 years 9 months ago
Realistic, Mathematically Tractable Graph Generation and Evolution, Using Kronecker Multiplication
How can we generate realistic graphs? In addition, how can we do so with a mathematically tractable model that makes it feasible to analyze their properties rigorously? Real graphs...
Jure Leskovec, Deepayan Chakrabarti, Jon M. Kleinb...