Sciweavers

2178 search results - page 117 / 436
» Toward Systemically Secure IT Architectures
Sort
View
147
Voted
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 8 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
WCRE
2003
IEEE
15 years 8 months ago
Toward an environment for comprehending distributed systems
Many modern software systems are often large, distributed, written in more than one programming language, and developed using pre-built components. This paper presents the results...
Maher Salah, Spiros Mancoridis
125
Voted
EDBT
2008
ACM
122views Database» more  EDBT 2008»
16 years 3 months ago
Architectural Concerns for Flexible Data Management
Evolving database management systems (DBMS) towards more flexibility in functionality, adaptation to changing requirements, and extensions with new or different components, is a c...
Ionut Emanuel Subasu, Patrick Ziegler, Klaus R. Di...
131
Voted
CCS
2010
ACM
15 years 6 months ago
Towards publishing recommendation data with predictive anonymization
Recommender systems are used to predict user preferences for products or services. In order to seek better prediction techniques, data owners of recommender systems such as Netfli...
Chih-Cheng Chang, Brian Thompson, Hui (Wendy) Wang...
119
Voted
JHSN
2006
96views more  JHSN 2006»
15 years 3 months ago
Supporting heterogeneous middleware security policies in WebCom
With the growing interest in service-oriented architectures, achieving seamless interoperability between heterogeneous middleware technologies has become increasingly important. W...
Simon N. Foley, Barry P. Mulcahy, Thomas B. Quilli...