Sciweavers

2849 search results - page 113 / 570
» As We Should Have Thought
Sort
View
FOSSACS
2009
Springer
14 years 5 months ago
On the Foundations of Quantitative Information Flow
There is growing interest in quantitative theories of information flow in a variety of contexts, such as secure information flow, anonymity protocols, and side-channel analysis. ...
Geoffrey Smith
ESCIENCE
2007
IEEE
14 years 5 months ago
Connecting Scientific Data to Scientific Experiments with Provenance
As scientific workflows and the data they operate on, grow in size and complexity, the task of defining how those workflows should execute (which resources to use, where the resou...
Simon Miles, Ewa Deelman, Paul T. Groth, Karan Vah...
ACCV
2006
Springer
14 years 5 months ago
Visual Surveillance Using Less ROIs of Multiple Non-calibrated Cameras
With a large number of surveillance cameras, it is not an easy task to determine which camera should be monitored and which region of the camera images should be checked so that al...
Takashi Nishizaki, Yoshinari Kameda, Yuichi Ohta
CONEXT
2006
ACM
14 years 5 months ago
Reformulating the monitor placement problem: optimal network-wide sampling
Confronted with the generalization of monitoring in operational networks, researchers have proposed placement algorithms that can help ISPs deploy their monitoring infrastructure ...
Gion Reto Cantieni, Gianluca Iannaccone, Chadi Bar...
SISW
2005
IEEE
14 years 4 months ago
Adding Secure Deletion to Your Favorite File System
Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who know...
Nikolai Joukov, Erez Zadok