Sciweavers

1779 search results - page 319 / 356
» A Formal Model of Data Privacy
Sort
View
130
Voted
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
15 years 9 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz
114
Voted
MIS
2001
Springer
89views Multimedia» more  MIS 2001»
15 years 8 months ago
Multimedia Metacomputing
The concept of multimedia metacomputing involves the formation of a large scale loosely coupled multiprocessing environment capable of performing complex transformations on media ...
Ulrich Marder, Jernej Kovse
160
Voted
BIRTHDAY
2008
Springer
15 years 5 months ago
A Heterogeneous Approach to UML Semantics
Abstract. UML models consist of several diagrams of different types describing different views of a software system ranging from specifications of the static system structure to de...
María Victoria Cengarle, Alexander Knapp, A...
154
Voted
FORTE
2010
15 years 5 months ago
Grouping Nodes in Wireless Sensor Networks Using Coalitional Game Theory
Wireless sensor networks are typically ad-hoc networks of resource-constrained nodes; in particular, the nodes are limited in power resources. It can be difficult and costly to rep...
Fatemeh Kazemeyni, Einar Broch Johnsen, Olaf Owe, ...
JODS
2008
123views Data Mining» more  JODS 2008»
15 years 3 months ago
The Harmony Integration Workbench
A key aspect of any data integration endeavor is determining the relationships between the source schemata and the target schema. This schema integration task must be tackled regar...
Peter Mork, Len Seligman, Arnon Rosenthal, Joel Ko...