Sciweavers

1790 search results - page 333 / 358
» On Privacy Models for RFID
Sort
View
IPPS
2008
IEEE
14 years 5 months ago
On performance bottleneck of anonymous communication networks
Although a significant amount of effort has been directed at discovering attacks against anonymity communication networks and developing countermeasures to those attacks, there i...
Ryan Pries, Wei Yu, Steve Graham, Xinwen Fu
DAWAK
2007
Springer
14 years 5 months ago
Automating the Schema Matching Process for Heterogeneous Data Warehouses
Abstract. A federated data warehouse is a logical integration of data warehouses applicable when physical integration is impossible due to privacy policy or legal restrictions. In ...
Marko Banek, Boris Vrdoljak, A. Min Tjoa, Zoran Sk...
ICCS
2007
Springer
14 years 5 months ago
Securely Deliver Data by Multi-path Routing Scheme in Wireless Mesh Networks
Wireless Mesh Networks with static Transit Access Points (TAPs) have many advantages to connect different kinds of networks. While Mobile Ad hoc Networks still have many challenges...
Cao Trong Hieu, Choong Seon Hong
MIDDLEWARE
2007
Springer
14 years 5 months ago
Middleware support for protecting personal data from web based data services
Web based data services are very popular with the average computer user. Examples of such services include Gmail.com, Yahoo Photos, Yahoo Briefcase and Amazon S3 Service. In such ...
Ravi Chandra Jammalamadaka
OOPSLA
2007
Springer
14 years 5 months ago
Synthesizing reactive systems from LSC requirements using the play-engine
Live Sequence Charts (LSCs) is a scenario-based language for modeling object-based reactive systems with liveness properties. A tool called the Play-Engine allows users to create ...
Hillel Kugler, Cory Plock, Amir Pnueli