Sciweavers

947 search results - page 63 / 190
» Information Security in Mobile Databases
Sort
View
145
Voted
SSDBM
2006
IEEE
140views Database» more  SSDBM 2006»
15 years 9 months ago
A Dynamic Mobility Histogram Construction Method Based on Markov Chains
With the recent progress of spatial information technologies and communication technologies, it has become easier to track positions of a large number of moving objects in real-ti...
Yoshiharu Ishikawa, Yoji Machida, Hiroyuki Kitagaw...
168
Voted
HASE
2008
IEEE
15 years 10 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
154
Voted
CIKM
2006
Springer
15 years 7 months ago
Privacy preserving sequential pattern mining in distributed databases
Research in the areas of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent years. ...
Vishal Kapoor, Pascal Poncelet, François Tr...
ENTCS
2007
131views more  ENTCS 2007»
15 years 3 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo
139
Voted
ER
1998
Springer
147views Database» more  ER 1998»
15 years 7 months ago
An Active Conceptual Model for Fixed Income Securities Analysis for Multiple Financial Institutions
The practical implementation and use of a mediator for fixed income securities analysis demonstrated the potential for extending the application of conceptual modeling from the sys...
Allen Moulton, Stéphane Bressan, Stuart E. ...