Sciweavers

674 search results - page 65 / 135
» An Efficient Key Management Scheme for Pervasive Computing
Sort
View
SOUPS
2010
ACM
13 years 11 months ago
Optimizing a policy authoring framework for security and privacy policies
Policies which address security and privacy are pervasive parts of both technical and social systems, and technology to enable both organizations and individuals to create and man...
Maritza Johnson, John Karat, Clare-Marie Karat, Ke...
CRYPTO
2010
Springer
208views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
Improved Delegation of Computation Using Fully Homomorphic Encryption
Following Gennaro, Gentry, and Parno (Cryptology ePrint Archive 2009/547), we use fully homomorphic encryption to design improved schemes for delegating computation. In such schem...
Kai-Min Chung, Yael Kalai, Salil P. Vadhan
ICAT
2003
IEEE
14 years 29 days ago
ZEUS: Network Aware QoS Management for Immersive Environment
The production value accomplished with virtual studio applications is becoming more attractive to the modern broadcasting studios. One of the drawbacks in today's virtual stu...
Jin Ryong Kim, Yuichi Iwadate, Youjip Won
CIDR
2003
123views Algorithms» more  CIDR 2003»
13 years 9 months ago
Managing Expressions as Data in Relational Database Systems
A wide-range of applications, including Publish/Subscribe, Workflow, and Web-site Personalization, require maintaining user’s interest in expected data as conditional expression...
Aravind Yalamanchi, Jagannathan Srinivasan, Dieter...
JHSN
2006
85views more  JHSN 2006»
13 years 7 months ago
A scalable intra-domain resource management architecture for DiffServ networks
With the rapid growth of the Internet into a global communication and commercial infrastructure, the need for Quality of Services (QoS) in the Internet becomes more and more import...
Haci A. Mantar, Ibrahim T. Okumus, Junseok Hwang, ...