Sciweavers

1207 search results - page 179 / 242
» Towards optimal k-anonymization
Sort
View
INFOCOM
2009
IEEE
14 years 3 months ago
Minimizing Probing Cost for Detecting Interface Failures: Algorithms and Scalability Analysis
— The automatic detection of failures in IP paths is an essential step for operators to perform diagnosis or for overlays to adapt. We study a scenario where a set of monitors se...
Hung Xuan Nguyen, Renata Teixeira, Patrick Thiran,...
IPPS
2009
IEEE
14 years 3 months ago
Multi-dimensional characterization of temporal data mining on graphics processors
Through the algorthmic design patterns of data parallelism and task parallelism, the graphics processing unit (GPU) offers the potential to vastly accelerate discovery and innovat...
Jeremy S. Archuleta, Yong Cao, Thomas Scogland, Wu...
CANS
2009
Springer
180views Cryptology» more  CANS 2009»
14 years 3 months ago
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
Chong Hee Kim, Gildas Avoine
ISLPED
2009
ACM
125views Hardware» more  ISLPED 2009»
14 years 3 months ago
Behavior-level observability don't-cares and application to low-power behavioral synthesis
Many techniques for power management employed in advanced RTL synthesis tools rely explicitly or implicitly on observability don’t-care (ODC) conditions. In this paper we presen...
Jason Cong, Bin Liu, Zhiru Zhang
ISLPED
2009
ACM
111views Hardware» more  ISLPED 2009»
14 years 3 months ago
Tracking the power in an enterprise decision support system
Enterprises rely on decision support systems to influence critical business choices. At the same time, IT-related power costs are growing and are a key concern for enterprise exe...
Justin Meza, Mehul A. Shah, Parthasarathy Ranganat...