Sciweavers

947 search results - page 88 / 190
» Information Security in Mobile Databases
Sort
View
140
Voted
PODS
2000
ACM
112views Database» more  PODS 2000»
15 years 8 months ago
Auditing Boolean Attributes
We study the problem of auditing databases which support statistical sum queries to protect the security of sensitive information; we focus on the special case in which the sensit...
Jon M. Kleinberg, Christos H. Papadimitriou, Prabh...
139
Voted
SIGMOD
2003
ACM
116views Database» more  SIGMOD 2003»
16 years 3 months ago
Multimedia streaming in large-scale sensor networks with mobile swarms
Abstract-- Sensor networking technologies have developed very rapidly in the last ten years. In many situations, high quality multimedia streams may be required for providing detai...
Mario Gerla, Kaixin Xu
137
Voted
MOBICOM
2010
ACM
15 years 3 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
142
Voted
MSR
2009
ACM
15 years 8 months ago
On mining data across software repositories
Software repositories provide abundance of valuable information about open source projects. With the increase in the size of the data maintained by the repositories, automated ext...
Prasanth Anbalagan, Mladen A. Vouk
140
Voted
AINA
2008
IEEE
15 years 10 months ago
Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks
An ad hoc network is a highly dynamic routing network cooperated by a set of wireless mobile nodes without any assistance of centralized access point. ARIADNE is a well-known secu...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...