Sciweavers

452 search results - page 7 / 91
» Exposing private information by timing web applications
Sort
View
EDBT
2012
ACM
225views Database» more  EDBT 2012»
11 years 10 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu
SIMPRA
2008
131views more  SIMPRA 2008»
13 years 7 months ago
Distributed simulation of DEVS and Cell-DEVS models in CD++ using Web-Services
: DEVS is a Modeling and Simulation formalism that has been widely used to study the dynamics of discrete event systems. Cell-DEVS is a DEVS-based formalism that defines spatial mo...
Gabriel A. Wainer, Rami Madhoun, Khaldoon Al-Zoubi
CRYPTO
2009
Springer
87views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Reconstructing RSA Private Keys from Random Key Bits
sion of an extended abstract published in Proceedings of Crypto 2009, Springer-Verlag, 2009. Available from the IACR Cryptology ePrint Archive as Report 2008/510. We show that an ...
Nadia Heninger, Hovav Shacham
AAAI
2006
13 years 9 months ago
Using the Semantic Web to Integrate Ecoinformatics Resources
We demonstrate an end-to-end use case of the semantic web's utility for synthesizing ecological and environmental data. ELVIS (the Ecosystem Location Visualization and Inform...
Cynthia Sims Parr, Andriy Parafiynyk, Joel Sachs, ...
ICWE
2005
Springer
14 years 1 months ago
Light-Weight Distributed Web Interfaces: Preparing the Web for Heterogeneous Environments
Abstract. In this paper we show an approach that allows web interfaces to dynamically distribute among several interconnected heterogeneous devices in an environment to support the...
Chris Vandervelpen, Geert Vanderhulst, Kris Luyten...