Sciweavers

184 search results - page 17 / 37
» A TMDM Disclosure Using T
Sort
View
CCS
2006
ACM
13 years 11 months ago
An efficient broadcast authentication scheme in wireless sensor networks
A broadcast authentication mechanism is important in wireless sensor networks, assuring receivers of a packet's validity. To provide authentication, some researchers utilize ...
Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, ...
JURIX
2007
13 years 9 months ago
Explaining the Relevance of Court Decisions to Laymen
In the context of intelligent disclosure of case law, we report on our findings with respect to the presentation of relevant court decisions back to the laymen users. For this pres...
Gwen R. Wildeboer, Michel C. A. Klein, Elisabeth M...
EOR
2006
86views more  EOR 2006»
13 years 7 months ago
Minimum-distance controlled perturbation methods for large-scale tabular data protection
National Statistical Agencies routinely release large amounts of tabular information. Prior to dissemination, tabular data needs to be processed to avoid the disclosure of individ...
Jordi Castro
ICUMT
2009
13 years 5 months ago
Information flow security for service compositions
Web services are ubiquitous technologies which are used for integrating business processes and services. As is the case in many other applications, the information processed in we...
Sabina Rossi, Damiano Macedonio
CIA
2006
Springer
13 years 11 months ago
Iterative Query-Based Approach to Efficient Task Decomposition and Resource Allocation
Intelligent coordination in complex multi-agent environments requires sophisticated mechanisms for suboptimal task decomposition and efficient resource allocation provided by the t...
Michal Pechoucek, Ondrej Lerch, Jirí B&iacu...