Sciweavers

680 search results - page 30 / 136
» Locating Hidden Servers
Sort
View
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
14 years 2 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
ICDE
2001
IEEE
118views Database» more  ICDE 2001»
14 years 11 months ago
Tuning an SQL-Based PDM System in a Worldwide Client/Server Environment
The management of product-related data in a uniform and consistent way is a big challenge for many manufacturing enterprises, especially the large ones like DaimlerChrysler. So-ca...
Erich Müller, Jost Enderle, M. Feltes, Peter ...
CADE
2008
Springer
14 years 10 months ago
Specification Predicates with Explicit Dependency Information
Specifications of programs use auxiliary symbols to encapsulate concepts for a variety of reasons: readability, reusability, structuring and, in particular, for writing recursive d...
Richard Bubel, Reiner Hähnle, Peter H. Schmit...
ICRA
2002
IEEE
91views Robotics» more  ICRA 2002»
14 years 3 months ago
Tactile Tracking of Arteries in Robotic Surgery
Locating arteries hidden beneath superficial tissue can be a difficult task in minimally invasive surgery. This paper reports the development of a system that finds the paths of a...
Ryan A. Beasley, Robert D. Howe
WMCSA
2009
IEEE
14 years 4 months ago
We saw each other on the subway: secure, anonymous proximity-based missed connections
There is an inherent tension between the value provided by Location-Based Services (LBSs) and the location-privacy concerns they raise. Unfortunately, users are often forced to ei...
Justin Manweiler, Ryan Scudellari, Zachary Cancio,...