Sciweavers

2715 search results - page 186 / 543
» Database Publication Practices
Sort
View
IJSN
2006
76views more  IJSN 2006»
13 years 8 months ago
Elliptic curve cryptography-based access control in sensor networks
: Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right ...
Haodong Wang, Bo Sheng, Qun Li
SIGECOM
2008
ACM
144views ECommerce» more  SIGECOM 2008»
13 years 8 months ago
Incentives for expressing opinions in online polls
Prediction markets efficiently extract and aggregate the private information held by individuals about events and facts that can be publicly verified. However, facts such as the e...
Radu Jurca, Boi Faltings
TVCG
2008
127views more  TVCG 2008»
13 years 8 months ago
EMDialog: Bringing Information Visualization into the Museum
Digital interactive information displays are becoming more common in public spaces such as museums, galleries, and libraries. However, the public nature of these locations requires...
Uta Hinrichs, Holly Schmidt, M. Sheelagh T. Carpen...
CORR
2010
Springer
67views Education» more  CORR 2010»
13 years 5 months ago
Secret Sharing LDPC Codes for the Constrained Gaussian Wiretap Channel
The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a destination intend to share secret information over a Gaussian channel in the presenc...
Chan Wong Wong, Tan F. Wong, John M. Shea
PODS
2009
ACM
113views Database» more  PODS 2009»
14 years 8 months ago
Relative information completeness
The paper investigates the question of whether a partially closed database has complete information to answer a query. In practice an enterprise often maintains master data Dm, a ...
Wenfei Fan, Floris Geerts