Sciweavers

726 search results - page 86 / 146
» An Access Control Scheme for Protecting Personal Data
Sort
View
AMR
2007
Springer
143views Multimedia» more  AMR 2007»
14 years 1 months ago
User Modelling for Interactive User-Adaptive Collection Structuring
Abstract. Automatic structuring is one means to ease access to document collections, be it for organization or for exploration. Of even greater help would be a presentation that ad...
Andreas Nürnberger, Sebastian Stober
SIGMETRICS
2008
ACM
161views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
Noncooperative power control and transmission scheduling in wireless collision channels
We consider a wireless collision channel, shared by a finite number of mobile users who transmit to a common base station using a random access protocol. Mobiles are selfoptimizin...
Ishai Menache, Nahum Shimkin
IACR
2011
129views more  IACR 2011»
12 years 7 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
TKDE
2002
140views more  TKDE 2002»
13 years 7 months ago
Transaction Processing in Mobile, Heterogeneous Database Systems
As technological advances are made in software and hardware, the feasibility of accessing information "any time, anywhere" is becoming a reality. Furthermore, the diversi...
James B. Lim, Ali R. Hurson
SOCIALCOM
2010
13 years 5 months ago
A Private and Reliable Recommendation System for Social Networks
Abstract--With the proliferation of internet-based social networks into our lives, new mechanisms to control the release and use of personal data are required. As a step toward thi...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla