Sciweavers

26 search results - page 4 / 6
» Tunable Balancing of RSA
Sort
View
PET
2009
Springer
14 years 1 months ago
Privacy-Preserving Policy-Based Information Transfer
As the global society becomes more interconnected and more privacy-conscious, communication protocols must balance access control with protecting participants’ privacy. A common ...
Emiliano De Cristofaro, Stanislaw Jarecki, Jihye K...
SAC
2004
ACM
14 years 22 days ago
Caching in Web memory hierarchies
Web cache replacement algorithms have received a lot of attention during the past years. Though none of the proposed algorithms deals efficiently with all the particularities of t...
Dimitrios Katsaros, Yannis Manolopoulos
KDD
2010
ACM
265views Data Mining» more  KDD 2010»
13 years 9 months ago
Scalable influence maximization for prevalent viral marketing in large-scale social networks
Influence maximization, defined by Kempe, Kleinberg, and Tardos (2003), is the problem of finding a small set of seed nodes in a social network that maximizes the spread of influe...
Wei Chen, Chi Wang, Yajun Wang
SJ
2011
13 years 2 months ago
Analyzing the Resilience of Complex Supply Network Topologies Against Random and Targeted Disruptions
—In this paper, we study the resilience of supply networks against disruptions and provide insights to supply chain managers on how to construct a resilient supply network from t...
Kang Zhao, Akhil Kumar, Terry P. Harrison, John Ye...
JCST
2010
128views more  JCST 2010»
13 years 2 months ago
Queue Waiting Time Aware Dynamic Workflow Scheduling in Multicluster Environments
Abstract Workflows are prevailing in scientific computation. Multicluster environments emerge and provide more resources, benefiting workflows but also challenging the traditional ...
Zhi-Feng Yu, Wei-Song Shi