Sciweavers

347 search results - page 40 / 70
» Proactive Computing
Sort
View
GIS
2006
ACM
13 years 10 months ago
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
This paper tackles a major privacy threat in current location-based services where users have to report their exact locations to the database server in order to obtain their desir...
Chi-Yin Chow, Mohamed F. Mokbel, Xuan Liu
ICWS
2010
IEEE
13 years 11 months ago
Towards Data-Aware QoS-driven Adaptation for Service Orchestrations
Several activities in service oriented computing can benefit from the knowledge of properties of a given service composition ahead of time. We will focus here on properties related...
Dragan Ivanovic, Manuel Carro, Manuel V. Hermenegi...
AUSFORENSICS
2004
13 years 11 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot
ISSA
2004
13 years 11 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
IPPS
2007
IEEE
14 years 4 months ago
Improving Data Access Performance with Server Push Architecture
Data prefetching, where data is fetched before CPU demands for it, has been considered as an effective solution to mask data access latency. However, the current client-initiated ...
Xian-He Sun, Surendra Byna, Yong Chen