Sciweavers

947 search results - page 67 / 190
» Information Security in Mobile Databases
Sort
View
INFOSCALE
2009
ACM
15 years 8 months ago
CAWA: Continuous Approximate Where-About Queries
With the current proliferation of wireless networks and mobile device technologies, the management of moving object databases to facilitate queries over these domains has been exte...
Alexander J. Aved, Kien A. Hua, Antoniya Petkova
126
Voted
SP
2007
IEEE
102views Security Privacy» more  SP 2007»
15 years 10 months ago
Improving the Robustness of Private Information Retrieval
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many variants of the basic PIR model have been proposed, including such modificati...
Ian Goldberg
CIKM
2004
Springer
15 years 9 months ago
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
At present, most of the state-of-the-art solutions for XML access controls are either (1) document-level access control techniques that are too limited to support fine-grained sec...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
135
Voted
ACIIDS
2009
IEEE
108views Database» more  ACIIDS 2009»
15 years 10 months ago
Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor Networks
Abstract—Wireless sensor networks(WSNs) have been regarded as an incarnation of Ad Hoc Networks for a specific application. Since a WSN consists of potentially hundreds of low c...
Zhongwei Zhang, Hong Zhou, Jason Gao
152
Voted
ICRA
2005
IEEE
138views Robotics» more  ICRA 2005»
15 years 9 months ago
Urban Object Recognition from Informative Local Features
Abstract— Autonomous mobile agents require object recognition for high level interpretation and localization in complex scenes. In urban environments, recognition of buildings mi...
Gerald Fritz, Christin Seifert, Lucas Paletta