Sciweavers

4397 search results - page 782 / 880
» Relational Algebra Operations
Sort
View
CN
2008
108views more  CN 2008»
13 years 9 months ago
An approach to the identification of network elements composing heterogeneous end-to-end paths
Today's networks are becoming increasingly complex and the ability to effectively and efficiently operate and manage them is ever more challenging. Ways to provide end-to-end...
Alessio Botta, Antonio Pescapè, Giorgio Ven...
EUROMED
2010
13 years 9 months ago
Realization of a Cartographic GIS for the Filing and Management of the Archaelogical Excavations in the Nelson's Island
The island of Nelson is situated around 7-8 miles far from the Egyptian Mediterranean coast, and about 25 km far from Alexandria of Egypt. It has small size, since it doesn't ...
Domenica Costantino, Maria Giuseppa Angelini
TON
2010
300views more  TON 2010»
13 years 9 months ago
POPI: a user-level tool for inferring router packet forwarding priority
— Packet forwarding prioritization (PFP) in routers is one of the mechanisms commonly available to network operators. PFP can have a significant impact on the accuracy of networ...
Guohan Lu, Yan Chen, Stefan Birrer, Fabián ...
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 8 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
USS
2010
13 years 8 months ago
Chipping Away at Censorship Firewalls with User-Generated Content
Oppressive regimes and even democratic governments restrict Internet access. Existing anti-censorship systems often require users to connect through proxies, but these systems are...
Sam Burnett, Nick Feamster, Santosh Vempala