Sciweavers

126 search results - page 21 / 26
» sara 2007
Sort
View
CHI
2007
ACM
14 years 10 months ago
Transfer scenarios: grounding innovation with marginal practices
Transfer scenarios is a method developed to support the design of innovative interactive technology. Such a method should help the designer to come up with inventive ideas, and at...
Sara Ljungblad, Lars Erik Holmquist
IMC
2007
ACM
13 years 11 months ago
Inferring subnets in router-level topology collection studies
Internet measurement studies require availability of representative topology maps. Depending on the map resolution (e.g., autonomous system level or router level), the procedure o...
Mehmet Hadi Gunes, Kamil Saraç
CCS
2007
ACM
14 years 4 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
GLOBECOM
2007
IEEE
14 years 4 months ago
Provider Provisioned Overlay Networks and Their Utility in DoS Defense
—The current overlay deployment model supports minimal or no involvement by ISPs in overlay deployment and operation. This model rules out a richer set of interactions between th...
Jinu Kurian, Kamil Saraç
ESORICS
2007
Springer
14 years 4 months ago
Fragmentation and Encryption to Enforce Privacy in Data Storage
Abstract. Privacy requirements have an increasing impact on the realization of modern applications. Technical considerations and many significant commercial and legal regulations ...
Valentina Ciriani, Sabrina De Capitani di Vimercat...