Sciweavers

316 search results - page 59 / 64
» Conditional Privacy-Aware Role Based Access Control
Sort
View
IAJIT
2010
157views more  IAJIT 2010»
13 years 6 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database
: Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the p...
Ashraf El-Sisi
IJET
2008
95views more  IJET 2008»
13 years 6 months ago
Supporting life-long competence development using the TENCompetence infrastructure: a first experiment
This paper describes an experiment to explore the effects of the TENCompetence infrastructure for supporting lifelong competence development which is now in development. This infra...
Judith Schoonenboom, Henk Sligte, Ayman Moghnieh, ...
WOWMOM
2005
ACM
108views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Reducing Inter-Cluster TDMA Interference by Adaptive MAC Allocation in Sensor Networks
This paper presents a Self-Reorganizing Slot Allocation (SRSA) mechanism for TDMA based Medium Access Control (MAC) in multi-cluster sensor networks. The aim is to provide a MAC l...
Tao Wu, Subir K. Biswas
IWPC
2005
IEEE
14 years 1 months ago
Working Session: Textual Views of Source Code to Support Comprehension
Source code can be viewed in many ways, with each view facilitating access to different information contained within the code. In this working session, we will explore the role th...
Anthony Cox, Michael L. Collard
ACNS
2004
Springer
77views Cryptology» more  ACNS 2004»
14 years 1 months ago
A Pay-per-Use DoS Protection Mechanism for the Web
Internet service providers have resisted deploying Denial-of-Service (DoS) protection mechanisms despite numerous research results in the area. This is so primarily because ISPs ca...
Angelos Stavrou, John Ioannidis, Angelos D. Keromy...