Sciweavers

1597 search results - page 226 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
JWSR
2007
172views more  JWSR 2007»
13 years 9 months ago
Service Class Driven Dynamic Data Source Discovery with DynaBot
: Dynamic Web data sources – sometimes known collectively as the Deep Web – increase the utility of the Web by providing intuitive access to data repositories anywhere that Web...
Daniel Rocco, James Caverlee, Ling Liu, Terence Cr...
PLDI
2011
ACM
12 years 12 months ago
EnerJ: approximate data types for safe and general low-power computation
Energy is increasingly a first-order concern in computer systems. Exploiting energy-accuracy trade-offs is an attractive choice in applications that can tolerate inaccuracies. Re...
Adrian Sampson, Werner Dietl, Emily Fortuna, Danus...
JNCA
2007
80views more  JNCA 2007»
13 years 9 months ago
High-speed routers design using data stream distributor unit
As the line rates standards are changing frequently to provide higher bit rates, the routers design has become very challenging due to the need for new wire-speed router’s netwo...
Ali El Kateeb
USS
2008
13 years 11 months ago
VoteBox: A Tamper-evident, Verifiable Electronic Voting System
Commercial electronic voting systems have experienced many high-profile software, hardware, and usability failures in real elections. While it is tempting to abandon electronic vo...
Daniel Sandler, Kyle Derr, Dan S. Wallach
VLDB
2004
ACM
245views Database» more  VLDB 2004»
14 years 2 months ago
A Multi-Purpose Implementation of Mandatory Access Control in Relational Database Management Systems
Mandatory Access Control (MAC) implementations in Relational Database Management Systems (RDBMS) have focused solely on Multilevel Security (MLS). MLS has posed a number of challe...
Walid Rjaibi, Paul Bird