Sciweavers

1207 search results - page 184 / 242
» Towards optimal k-anonymization
Sort
View
ICC
2007
IEEE
171views Communications» more  ICC 2007»
14 years 3 months ago
On the Performance of the AAA Systems in 3G Cellular Networks
— This paper analyzes the performance of a system architecture for the Authentication, Authorization, and Accounting (AAA), in a scenario where 3G users generate traffic and invo...
Said Zaghloul, Admela Jukan
ISCA
2007
IEEE
114views Hardware» more  ISCA 2007»
14 years 3 months ago
Mechanisms for bounding vulnerabilities of processor structures
Concern for the increasing susceptibility of processor structures to transient errors has led to several recent research efforts that propose architectural techniques to enhance r...
Niranjan Soundararajan, Angshuman Parashar, Anand ...
ISVD
2007
IEEE
14 years 3 months ago
Detecting Stellar Streams in the Halos of Galaxies with Voronoi Tessellations
Galaxy formation models oriented towards a ΛCDM cosmology envision galaxies as being built through the accretion of dwarf galaxies. Such galaxy accretion should appear as tidally...
Jonathan Sick, Roelof de Jong
MSS
2007
IEEE
111views Hardware» more  MSS 2007»
14 years 3 months ago
Enabling database-aware storage with OSD
The ANSI Object-based Storage Device (OSD) standard is a major step toward enabling explicit application­ awareness in storage systems behind a standard, fully­ interoperable in...
Aravindan Raghuveer, Steven W. Schlosser, Sami Ire...
TPHOL
2007
IEEE
14 years 3 months ago
Separation Logic for Small-Step cminor
Cminor is a mid-level imperative programming language; there are proved-correct optimizing compilers from C to Cminor and from Cminor to machine language. We have redesigned Cminor...
Andrew W. Appel, Sandrine Blazy