Sciweavers

1608 search results - page 169 / 322
» Challenges in Business Process Analysis
Sort
View
IEEEVAST
2010
13 years 5 months ago
Understanding text corpora with multiple facets
Text visualization becomes an increasingly more important research topic as the need to understand massive-scale textual information is proven to be imperative for many people and...
Lei Shi, Furu Wei, Shixia Liu, Li Tan, Xiaoxiao Li...
INFOCOM
2011
IEEE
13 years 2 months ago
STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs
—Receiver-location privacy is an important security requirement in privacy-preserving Vehicular Ad hoc Networks (VANETs), yet the unavailable receiver’s location information ma...
Xiaodong Lin, Rongxing Lu, Xiaohui Liang, Xuemin S...
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
12 years 1 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
DATE
2009
IEEE
126views Hardware» more  DATE 2009»
14 years 5 months ago
On hierarchical statistical static timing analysis
— Statistical static timing analysis deals with the increasing variations in manufacturing processes to reduce the pessimism in the worst case timing analysis. Because of the cor...
Bing Li, Ning Chen, Manuel Schmidt, Walter Schneid...
EIT
2008
IEEE
14 years 17 days ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno