Sciweavers

3638 search results - page 654 / 728
» Distribution chain security
Sort
View
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
14 years 12 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu
ICIP
2007
IEEE
14 years 11 months ago
Lossless Image Compression and Selective Encryption using a Discrete Radon Transform
In this paper we propose a new joint encryption and lossless compression technique designed for large images 1 . The proposed technique takes advantage of the Mojette transform pr...
Andrew Kingston, Simone Colosimo, Patrizio Campisi...
SIGSOFT
2008
ACM
14 years 11 months ago
Deriving input syntactic structure from execution
Program input syntactic structure is essential for a wide range of applications such as test case generation, software debugging and network security. However, such important info...
Zhiqiang Lin, Xiangyu Zhang
WWW
2007
ACM
14 years 10 months ago
Reliable QoS monitoring based on client feedback
Service-level agreements (SLAs) establish a contract between service providers and clients concerning Quality of Service (QoS) parameters. Without proper penalties, service provid...
Radu Jurca, Boi Faltings, Walter Binder
WWW
2006
ACM
14 years 10 months ago
An e-market framework for informed trading
Fully automated trading, such as e-procurement, using the Internet is virtually unheard of today. Three core technologies are needed to fully automate the trading process: data mi...
John K. Debenham, Simeon J. Simoff