Sciweavers

2009 search results - page 355 / 402
» A privacy-aware access control system
Sort
View
ACNS
2010
Springer
156views Cryptology» more  ACNS 2010»
13 years 12 months ago
COP: A Step toward Children Online Privacy
We propose COP, a client-side system for protecting children’s online privacy and empowering parental control over children’s information disclosure with little manual effort. ...
Wei Xu, Sencun Zhu, Heng Xu
PODS
1999
ACM
95views Database» more  PODS 1999»
13 years 12 months ago
Minimal Data Upgrading to Prevent Inference and Association
Despite advances in recent years in the area of mandatory access control in database systems, today's information repositories remain vulnerable to inference and data associa...
Steven Dawson, Sabrina De Capitani di Vimercati, P...
LCN
1999
IEEE
13 years 12 months ago
Measured Performance of the IEEE 802.11 Wireless LAN
The practical network performances of two commercial IEEE 802.11 compliant wireless local area networks (WLANs) are measured at the medium access control sublayer. A number of tes...
Benny Bing
IPPS
1998
IEEE
13 years 12 months ago
Code Transformations for Low Power Caching in Embedded Multimedia Processors
In this paper, we present several novel strategies to improve software controlled cache utilization, so as to achieve lower power requirements for multi-media and signal processin...
Chidamber Kulkarni, Francky Catthoor, Hugo De Man
TACAS
1998
Springer
98views Algorithms» more  TACAS 1998»
13 years 12 months ago
Efficient Modeling of Memory Arrays in Symbolic Ternary Simulation
This paper enables symbolic ternary simulation of systems with large embedded memories. Each memory array is replaced with a behavioral model, where the number of symbolic variable...
Miroslav N. Velev, Randal E. Bryant