Sciweavers

1754 search results - page 259 / 351
» On Evaluating and Publishing Data Concerns for Data as a Ser...
Sort
View
SIGMOD
2009
ACM
171views Database» more  SIGMOD 2009»
14 years 9 months ago
Secure outsourced aggregation via one-way chains
We consider the Outsourced Aggregation model, where sensing services outsource their sensor data collection and aggregation tasks to third-party service providers called aggregato...
Suman Nath, Haifeng Yu, Haowen Chan
INFOCOM
2009
IEEE
14 years 3 months ago
CPM: Adaptive Video-on-Demand with Cooperative Peer Assists and Multicast
—We present CPM, a unified approach that exploits server multicast, assisted by peer downloads, to provide efficient video-on-demand (VoD) in a service provider environment. We...
Vijay Gopalakrishnan, Samrat Bhattacharjee, K. K. ...
TMC
2010
230views more  TMC 2010»
13 years 7 months ago
Bandwidth Recycling in IEEE 802.16 Networks
—IEEE 802.16 standard was designed to support the bandwidth demanding applications with quality of service (QoS). Bandwidth is reserved for each application to ensure the QoS. Fo...
D. Chuck, J. M. Chang
CCS
2011
ACM
12 years 9 months ago
How to break XML encryption
XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It ...
Tibor Jager, Somorovsky Juraj
VLDB
2007
ACM
161views Database» more  VLDB 2007»
14 years 9 months ago
Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams
As computer systems are essential components of many critical commercial services, the need for secure online transactions is now becoming evident. The demand for such application...
Feifei Li, Ke Yi, Marios Hadjieleftheriou, George ...