Results 251 to 260 of about 1,009,466 (301)
Some of the next articles are maybe not open access.
Engineering and hosting adaptive freshness-sensitive web applications on data centers
Proceedings of the twelfth international conference on World Wide Web - WWW '03, 2003Wide-area database replication technologies and the availability of content delivery networks allow Web applications to be hosted and served from powerful data centers. This form of application support requires a complete Web application suite to be distributed along with the database replicas. A major advantage of this approach is that dynamic content
Wen-Syan Li +4 more
openaire +2 more sources
DP-OPT: Make Large Language Model Your Privacy-Preserving Prompt Engineer
International Conference on Learning Representations, 2023Large Language Models (LLMs) have emerged as dominant tools for various tasks, particularly when tailored for a specific target by prompt tuning. Nevertheless, concerns surrounding data privacy present obstacles due to the tuned prompts' dependency on ...
Junyuan Hong +5 more
semanticscholar +1 more source
Conference on Data and Application Security and Privacy, 2023
An in-vehicle infotainment (IVI) system is connected to heterogeneous networks such as Controller Area Network bus, Bluetooth, Wi-Fi, cellular, and other vehicle-to-everything communications.
S. Jeong +3 more
semanticscholar +1 more source
An in-vehicle infotainment (IVI) system is connected to heterogeneous networks such as Controller Area Network bus, Bluetooth, Wi-Fi, cellular, and other vehicle-to-everything communications.
S. Jeong +3 more
semanticscholar +1 more source
Sensitivity of Hosting Capacity to Data Resolution and Uncertainty Modeling
2018 Australasian Universities Power Engineering Conference (AUPEC), 2018Integration limits of distributed generations (DGs) in distribution networks, i.e. the hosting capacity (HC), are highly dependent on uncertainties associated with the size, location and output power of DGs. Addressing these uncertainties to a great extent is reliant on the availability and resolution of the historical data. This paper investigates the
Mohammad Seydali Seyf Abad +4 more
openaire +1 more source
A Host Based Method for Data Leak Protection by Tracking Sensitive Data Flow
2012 IEEE 19th International Conference and Workshops on Engineering of Computer-Based Systems, 2012This paper describes a method for data leak protection (DLP) based on tracking sensitive information as it flows inside file system on a host. The method is based on the idea that every flow from sensitive to non-sensitive object increases the security level of the target object to that of the source object.
Miodrag Petkovic +3 more
openaire +1 more source
Multilayer Technique to Secure Data Transfer in Private Cloud for SaaS Applications
International Conference on Innovative Mechanisms for Industry Applications, 2020In recent times Cloud Computing[CC] has emanated as a substitute paradigm for hosting and providing services over the Internet. Software as a Service (Saas) is one among such services that deliver services to the end-users on pay-as-you-go manner.
Suyash Ghuge +3 more
semanticscholar +1 more source
Influence of particle size on the effective thermal conductivity of nanofluids: A critical review
, 2020Nanofluid is an innovative class of nanotechnology-based thermal fluids and has been proven to improve the energy conversion process efficiency significantly.
T. Ambreen, Man-Hoe Kim
semanticscholar +1 more source
Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs
International Conference on Automated Software Engineering, 2023Mini-programs (MiniApps), lightweight versions of full-featured mobile apps that run inside a host app such as WeChat, have become increasingly popular due to their simplified and convenient user experiences.
Shi Meng +6 more
semanticscholar +1 more source

