Sciweavers

733 search results - page 8 / 147
» Private inference control
Sort
View
FC
2006
Springer
109views Cryptology» more  FC 2006»
13 years 11 months ago
A Private Stable Matching Algorithm
Existing stable matching algorithms reveal the preferences of all participants, as well as the history of matches made and broken in the course of computing a stable match. This in...
Philippe Golle
AINA
2007
IEEE
14 years 2 months ago
MAC Address Translation for Enabling Scalable Virtual Private LAN Services
Virtual Private LAN Service (VPLS) has been considered as a feasible solution for transparent LAN service. By virtually locating all of the service intelligence in the provider ed...
Pi-Chung Wang, Chia-Tai Chan, Po-Yen Lin
HPCA
2007
IEEE
14 years 1 months ago
An Adaptive Shared/Private NUCA Cache Partitioning Scheme for Chip Multiprocessors
The significant speed-gap between processor and memory and the limited chip memory bandwidth make last-level cache performance crucial for future chip multiprocessors. To use the...
Haakon Dybdahl, Per Stenström
FC
2005
Springer
120views Cryptology» more  FC 2005»
14 years 1 months ago
Achieving Fairness in Private Contract Negotiation
Abstract. Suppose Alice and Bob are two entities (e.g. agents, organizations, etc.) that wish to negotiate a contract. A contract consists of several clauses, and each party has ce...
Keith B. Frikken, Mikhail J. Atallah
IJNSEC
2007
139views more  IJNSEC 2007»
13 years 7 months ago
Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
Large scale distributed applications combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new secur...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...