Sciweavers

947 search results - page 94 / 190
» Information Security in Mobile Databases
Sort
View
151
Voted
ICRA
2008
IEEE
158views Robotics» more  ICRA 2008»
15 years 10 months ago
Informed visual search: Combining attention and object recognition
Abstract— This paper studies the sequential object recognition problem faced by a mobile robot searching for specific objects within a cluttered environment. In contrast to curr...
Per-Erik Forssén, David Meger, Kevin Lai, S...
123
Voted
ACSAC
2010
IEEE
15 years 1 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
139
Voted
EDBT
2006
ACM
179views Database» more  EDBT 2006»
16 years 3 months ago
TrajPattern: Mining Sequential Patterns from Imprecise Trajectories of Mobile Objects
Abstract. Mobile objects have become ubiquitous in our everyday lives, ranging from cellular phones to sensors, therefore, analyzing and mining mobile data becomes an interesting p...
Jiong Yang, Meng Hu
145
Voted
ACSW
2003
15 years 5 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
127
Voted
KDD
2005
ACM
109views Data Mining» more  KDD 2005»
16 years 4 months ago
A new scheme on privacy-preserving data classification
We address privacy-preserving classification problem in a distributed system. Randomization has been the approach proposed to preserve privacy in such scenario. However, this appr...
Nan Zhang 0004, Shengquan Wang, Wei Zhao