Results 251 to 260 of about 1,009,466 (301)
Some of the next articles are maybe not open access.

Engineering and hosting adaptive freshness-sensitive web applications on data centers

Proceedings of the twelfth international conference on World Wide Web - WWW '03, 2003
Wide-area database replication technologies and the availability of content delivery networks allow Web applications to be hosted and served from powerful data centers. This form of application support requires a complete Web application suite to be distributed along with the database replicas. A major advantage of this approach is that dynamic content
Wen-Syan Li   +4 more
openaire   +2 more sources

DP-OPT: Make Large Language Model Your Privacy-Preserving Prompt Engineer

International Conference on Learning Representations, 2023
Large Language Models (LLMs) have emerged as dominant tools for various tasks, particularly when tailored for a specific target by prompt tuning. Nevertheless, concerns surrounding data privacy present obstacles due to the tuned prompts' dependency on ...
Junyuan Hong   +5 more
semanticscholar   +1 more source

Infotainment System Matters: Understanding the Impact and Implications of In-Vehicle Infotainment System Hacking with Automotive Grade Linux

Conference on Data and Application Security and Privacy, 2023
An in-vehicle infotainment (IVI) system is connected to heterogeneous networks such as Controller Area Network bus, Bluetooth, Wi-Fi, cellular, and other vehicle-to-everything communications.
S. Jeong   +3 more
semanticscholar   +1 more source

Sensitivity of Hosting Capacity to Data Resolution and Uncertainty Modeling

2018 Australasian Universities Power Engineering Conference (AUPEC), 2018
Integration limits of distributed generations (DGs) in distribution networks, i.e. the hosting capacity (HC), are highly dependent on uncertainties associated with the size, location and output power of DGs. Addressing these uncertainties to a great extent is reliant on the availability and resolution of the historical data. This paper investigates the
Mohammad Seydali Seyf Abad   +4 more
openaire   +1 more source

A Host Based Method for Data Leak Protection by Tracking Sensitive Data Flow

2012 IEEE 19th International Conference and Workshops on Engineering of Computer-Based Systems, 2012
This paper describes a method for data leak protection (DLP) based on tracking sensitive information as it flows inside file system on a host. The method is based on the idea that every flow from sensitive to non-sensitive object increases the security level of the target object to that of the source object.
Miodrag Petkovic   +3 more
openaire   +1 more source

Multilayer Technique to Secure Data Transfer in Private Cloud for SaaS Applications

International Conference on Innovative Mechanisms for Industry Applications, 2020
In recent times Cloud Computing[CC] has emanated as a substitute paradigm for hosting and providing services over the Internet. Software as a Service (Saas) is one among such services that deliver services to the end-users on pay-as-you-go manner.
Suyash Ghuge   +3 more
semanticscholar   +1 more source

Influence of particle size on the effective thermal conductivity of nanofluids: A critical review

, 2020
Nanofluid is an innovative class of nanotechnology-based thermal fluids and has been proven to improve the energy conversion process efficiency significantly.
T. Ambreen, Man-Hoe Kim
semanticscholar   +1 more source

Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs

International Conference on Automated Software Engineering, 2023
Mini-programs (MiniApps), lightweight versions of full-featured mobile apps that run inside a host app such as WeChat, have become increasingly popular due to their simplified and convenient user experiences.
Shi Meng   +6 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy