Sciweavers

2237 search results - page 299 / 448
» Storing information with extractors
Sort
View
CCS
2010
ACM
14 years 5 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
DSN
2008
IEEE
14 years 5 months ago
Analyzing the effects of disk-pointer corruption
The long-term availability of data stored in a file system depends on how well it safeguards on-disk pointers used to access the data. Ideally, a system would correct all pointer...
Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin ...
FGCN
2008
IEEE
153views Communications» more  FGCN 2008»
14 years 5 months ago
Towards Automated Traffic System Using Vehicular Network with Directional Antenna
Vehicular network became one of the most active and emerging fields of research during last decade. Its use in diversified applications (for example safe driving, congestion avoid...
Chowdhury Sayeed Hyder, Anindya Iqbal, Une Thoing ...
HICSS
2008
IEEE
104views Biometrics» more  HICSS 2008»
14 years 5 months ago
Virtual Experiential Marketing on Online Customer Intentions and Loyalty
Advances in information and web technologies have open numerous opportunities for online retailing. The pervasiveness of the Internet coupled with the keenness in competition amon...
Jashen Chen, Russell K. H. Ching, Margaret Meiling...
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
14 years 5 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo