Sciweavers

511 search results - page 91 / 103
» Computational aspects of the FLBC framework
Sort
View
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
15 years 7 months ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li
ICWS
2009
IEEE
14 years 4 months ago
Integrating Behavioral Trust in Web Service Compositions
Algorithms for composing Web services (WS) traditionally utilize the functional and quality-of-service parameters of candidate services to decide which services to include in the ...
Sharon Paradesi, Prashant Doshi, Sonu Swaika
DRM
2009
Springer
14 years 2 months ago
Videosurveillance and privacy: covering the two sides of the mirror with DRM
Privacy and security have always been key concerns for individuals. They have also been closely related concepts: in order to increase their perception of security, people sacri...
Juan Ramón Troncoso-Pastoriza, Pedro Comesa...
FCCM
2008
IEEE
162views VLSI» more  FCCM 2008»
14 years 2 months ago
Multiobjective Optimization of FPGA-Based Medical Image Registration
With a multitude of technological innovations, one emerging trend in image processing, and medical image processing, in particular, is custom hardware implementation of computatio...
Omkar Dandekar, William Plishker, Shuvra S. Bhatta...
ISORC
2008
IEEE
14 years 2 months ago
A Real-Time Java Component Model
The Real-Time Specification for Java (RTSJ) [10] is becoming a popular choice in the world of real-time programming. However, the complexities introduced by RTSJ bring the needs ...
Ales Plsek, Philippe Merle, Lionel Seinturier