Sciweavers

176 search results - page 10 / 36
» The Cost of Privatization
Sort
View
GCA
2007
13 years 8 months ago
Transparent File Protection in On-Demand Computing
On-Demand Computing fulfills the need of computing availability at limited hardware and software costs. Distributed systems of this kind typically store user files in a shared ...
Fabio Dellutri, Salvatore Di Blasi, Giuseppe F. It...
CORR
2010
Springer
156views Education» more  CORR 2010»
13 years 7 months ago
Selling Privacy at Auction
We initiate the study of markets for private data, through the lens of differential privacy. Although the purchase and sale of private data has already begun on a large scale, a t...
Arpita Ghosh, Aaron Roth
CACM
2011
96views more  CACM 2011»
13 years 2 months ago
Why STM can be more than a research toy
Software Transactional Memory (STM) promises to simplify concurrent programming without requiring specific hardware support. Yet, STM’s credibility lies on the extent to which ...
Aleksandar Dragojevic, Pascal Felber, Vincent Gram...
NOMS
2000
IEEE
138views Communications» more  NOMS 2000»
13 years 11 months ago
Policy-based hybrid management architecture for IP-based VPN
Using IP-based Virtual Private Network (IP-VPN) technology, a company can establish its virtual private network over public networks. Recently, IP-VPN emerges as one of main techn...
Seung-Jin Baek, Moon-Sang Jeong, Jong-Tae Park, Ta...
APPROX
2009
Springer
149views Algorithms» more  APPROX 2009»
14 years 1 months ago
On the Complexity of the Asymmetric VPN Problem
We give the first constant factor approximation algorithm for the asymmetric Virtual Private Network (Vpn) problem with arbitrary concave costs. We even show the stronger result, ...
Thomas Rothvoß, Laura Sanità