Sciweavers

148 search results - page 27 / 30
» Flickr: Who is Looking
Sort
View
ACISP
2005
Springer
14 years 3 months ago
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management
Abstract. RFID tags are tiny, inexpensive, inductively powered computers that are going to replace bar codes on many products, but which have many other uses as well. For example, ...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
CCS
2005
ACM
14 years 3 months ago
Obfuscated databases and group privacy
We investigate whether it is possible to encrypt a database and then give it away in such a form that users can still access it, but only in a restricted way. In contrast to conve...
Arvind Narayanan, Vitaly Shmatikov
ICISS
2005
Springer
14 years 3 months ago
Event Detection in Multilevel Secure Active Databases
The event-condition-action paradigm (also known as triggers or rules) is a powerful technology. It gives a database “active” capabilities – the ability to react automatically...
Indrakshi Ray, Wei Huang
NPAR
2004
ACM
14 years 3 months ago
Image and video based painterly animation
ssionism”, (bottom row) “Abstract”, “Pointillism”, “Flower” and “Abstract” styles. Figure 3 shows some of the brush strokes used. We present techniques for trans...
James Hays, Irfan A. Essa
XIMEP
2004
ACM
108views Database» more  XIMEP 2004»
14 years 3 months ago
The Joy of SAX
Most current XQuery implementations require that all XML data reside in memory in one form or another before they start processing the data. This is unacceptable for large XML doc...
Leonidas Fegaras