Sciweavers

726 search results - page 44 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
IPSN
2007
Springer
14 years 1 months ago
Harbor: software-based memory protection for sensor nodes
Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no...
Ram Kumar, Eddie Kohler, Mani B. Srivastava
IEEEARES
2008
IEEE
14 years 2 months ago
A Post-processing Method to Lessen k-Anonymity Dissimilarities
Protecting personal data is essential to guarantee the rule of law1 . Due to the new Information and Communication Technologies (ICTs) unprecedented amounts of personal data can b...
Agusti Solanas, Gloria Pujol, Antoni Martín...
VTC
2010
IEEE
123views Communications» more  VTC 2010»
13 years 6 months ago
Downlink Power Control Scheme for Smart Antenna Based Wireless Systems
— In this paper, we propose a downlink power control scheme for a wireless system which utilizes a smart antenna technology for space division multiple access(SDMA). In the wirel...
Woongsup Lee, Dong-Ho Cho
EV
2008
63views Hardware» more  EV 2008»
13 years 9 months ago
Secure Remote Voter Registration
: Voter registration is an important issue in election processes. In order to protect the election accuracy, it is necessary to have an accurate electoral roll of eligible voters. ...
Victor Morales-Rocha, Jordi Puiggali, Miguel Soria...
HPCA
1996
IEEE
13 years 11 months ago
Protected, User-Level DMA for the SHRIMP Network Interface
Traditional DMA requires the operating system to perform many tasks to initiate a transfer, with overhead on the order of hundreds or thousands of CPU instructions. This paper des...
Matthias A. Blumrich, Cezary Dubnicki, Edward W. F...