Sciweavers

89 search results - page 6 / 18
» Information Theoretic Bounds on Authentication Systems in Qu...
Sort
View
TIT
2008
73views more  TIT 2008»
13 years 7 months ago
Detection of Information Flows
Abstract-- Distributed detection of information flows by timing analysis is considered. Timing measurements are subject to perturbations and the insertion of chaff noise. Moreover,...
Ting He, Lang Tong
ICDE
1998
IEEE
139views Database» more  ICDE 1998»
14 years 1 hour ago
Cost and Imprecision in Modeling the Position of Moving Objects
Consider a database that represents the location of moving objects, such as taxi-cabs (typical query: retrieve the cabs that are currently within 1 mile of 33 Michigan Ave., Chica...
Ouri Wolfson, Sam Chamberlain, Son Dao, Liqin Jian...
SAC
2003
ACM
14 years 1 months ago
Broadcast Program Generation for Unordered Queries with Data Replication
We study in this paper the problem of broadcasting dependent data for unordered queries. However, most prior studies on dependent data broadcasting are limited to the premise of n...
Jiun-Long Huang, Ming-Syan Chen
DBSEC
2006
160views Database» more  DBSEC 2006»
13 years 9 months ago
On Finding an Inference-Proof Complete Database for Controlled Query Evaluation
Abstract. Controlled Query Evaluation (CQE) offers a logical framework to prevent a user of a database from inadvertently gaining knowledge he is not allowed to know. By modeling t...
Joachim Biskup, Lena Wiese
CSE
2009
IEEE
13 years 11 months ago
Social Tagging in Query Expansion: A New Way for Personalized Web Search
Social networks and collaborative tagging systems are rapidly gaining popularity as primary means for sorting and sharing data: users tag their bookmarks in order to simplify infor...
Claudio Biancalana, Alessandro Micarelli