Sciweavers

7741 search results - page 1406 / 1549
» Security in Active Networks
Sort
View
TDP
2010
166views more  TDP 2010»
14 years 11 months ago
Communication-Efficient Privacy-Preserving Clustering
The ability to store vast quantities of data and the emergence of high speed networking have led to intense interest in distributed data mining. However, privacy concerns, as well ...
Geetha Jagannathan, Krishnan Pillaipakkamnatt, Reb...
218
Voted
POPL
2012
ACM
14 years 5 days ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
140
Voted
SIGSOFT
2008
ACM
16 years 5 months ago
Latent social structure in open source projects
Commercial software project managers design project organizational structure carefully, mindful of available skills, division of labour, geographical boundaries, etc. These organi...
Christian Bird, David S. Pattison, Raissa M. D'Sou...
EUROSYS
2009
ACM
16 years 1 months ago
Transparent checkpoints of closed distributed systems in Emulab
Emulab is a testbed for networked and distributed systems experimentation. Two guiding principles of its design are realism and control of experimentation. There is an inherent te...
Anton Burtsev, Prashanth Radhakrishnan, Mike Hible...
ICASSP
2009
IEEE
15 years 11 months ago
Beacon-assisted spectrum access with cooperative cognitive transmitter and receiver
—Spectrum access is an important function of cognitive radios for detecting and utilizing spectrum holes without harming the legacy systems. In this paper, we propose novel coope...
Ali Tajer, Xiaodong Wang
« Prev « First page 1406 / 1549 Last » Next »