Sciweavers

337 search results - page 47 / 68
» Managing the Health of Security Experiments
Sort
View
SIGMOD
2010
ACM
236views Database» more  SIGMOD 2010»
14 years 1 months ago
Differentially private aggregation of distributed time-series with transformation and encryption
We propose PASTE, the first differentially private aggregation algorithms for distributed time-series data that offer good practical utility without any trusted server. PASTE add...
Vibhor Rastogi, Suman Nath
PUC
2008
141views more  PUC 2008»
13 years 8 months ago
MobGeoSen: facilitating personal geosensor data collection and visualization using mobile phones
Mobile sensing and mapping applications are becoming more prevalent because sensing hardware is becoming more portable and more affordable. However, most of the hardware uses small...
Eiman Kanjo, Steve Benford, Mark Paxton, Alan Cham...
ICDCS
2011
IEEE
12 years 8 months ago
Accuracy-Aware Interference Modeling and Measurement in Wireless Sensor Networks
Abstract—Wireless Sensor Networks (WSNs) are increasingly available for mission-critical applications such as emergency management and health care. To meet the stringent requirem...
Jun Huang, Shucheng Liu, Guoliang Xing, Hongwei Zh...
SACMAT
2010
ACM
13 years 7 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
CHI
2011
ACM
13 years 3 days ago
Home automation in the wild: challenges and opportunities
Visions of smart homes have long caught the attention of researchers and considerable effort has been put toward enabling home automation. However, these technologies have not bee...
A. J. Bernheim Brush, Bongshin Lee, Ratul Mahajan,...