Sciweavers

1522 search results - page 236 / 305
» Use of Devolved Controllers in Data Center Networks
Sort
View
WWW
2010
ACM
14 years 4 months ago
Privacy wizards for social networking sites
Privacy is an enormous problem in online social networking sites. While sites such as Facebook allow users fine-grained control over who can see their profiles, it is difficult ...
Lujun Fang, Kristen LeFevre
IADIS
2004
13 years 10 months ago
A Framework for Symbolic Distributed Computer-Aided Design over the Internet
Economical globalization and outsourcing have inspired the surge of research in distributed computer-aided design. This paper presents a framework for Internet-based symbolic dist...
Yingcai Xiao, Shivakumar Kubendrachari
IJOE
2008
98views more  IJOE 2008»
13 years 9 months ago
OpenLabs Security Laboratory - The Online Security Experiment Platform
For experiments to be reproducible, it is important to have a known and controlled environment. This requires isolation from the surroundings. For security experiments, e.g. with h...
Johan Zackrisson, Charlie Svahnberg
MAM
2007
127views more  MAM 2007»
13 years 9 months ago
Indoor solar energy harvesting for sensor network router nodes
A unique method has been developed to scavenge solar energy from monocrystalline solar cells to power wireless router nodes that are used in indoor applications. This method elimi...
Abhiman Hande, Todd Polk, William Walker, Dinesh B...
ACSAC
2006
IEEE
14 years 3 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu