Sciweavers

3305 search results - page 194 / 661
» Can we Rely on SQL
Sort
View
IJISEC
2008
119views more  IJISEC 2008»
13 years 10 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
JSW
2006
111views more  JSW 2006»
13 years 10 months ago
AppBus: Mobile Device Application Collaboration via Short Term Memory
The increasing quality of computation and connectivity on mobile devices has motivated a need for data-sharing between resident services. Most such services rely on the user to tra...
Craig Janssen, Michael Pearce, Shriram Kollipara, ...
PERVASIVE
2006
Springer
13 years 10 months ago
Declarative Support for Sensor Data Cleaning
Pervasive applications rely on data captured from the physical world through sensor devices. Data provided by these devices, however, tend to be unreliable. The data must, therefor...
Shawn R. Jeffery, Gustavo Alonso, Michael J. Frank...
TON
2008
102views more  TON 2008»
13 years 10 months ago
Internet traffic behavior profiling for network security monitoring
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya
ICASSP
2010
IEEE
13 years 9 months ago
Content-aware H.264 encoding for traffic video tracking applications
The compression of video can reduce the accuracy of tracking algorithms, which is problematic for centralized applications that rely on remotely captured and compressed video for ...
Eren Soyak, Sotirios A. Tsaftaris, Aggelos K. Kats...