Sciweavers

988 search results - page 5 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
PERVASIVE
2005
Springer
14 years 2 months ago
A Formal Model of Obfuscation and Negotiation for Location Privacy
Obfuscation concerns the practice of deliberately degrading the quality of information in some way, so as to protect the privacy of the individual to whom that information refers. ...
Matt Duckham, Lars Kulik
GRC
2007
IEEE
13 years 9 months ago
Privacy Preserving Collaborative Filtering Using Data Obfuscation
Collaborative filtering (CF) systems are being widely used in E-commerce applications to provide recommendations to users regarding products that might be of interest to them. Th...
Rupa Parameswaran, Douglas M. Blough
MICRO
2009
IEEE
315views Hardware» more  MICRO 2009»
14 years 3 months ago
Control flow obfuscation with information flow tracking
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is us...
Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huan...
TRUST
2010
Springer
14 years 1 months ago
Robust Combiners for Software Hardening
All practical software hardening schemes, as well as practical encryption schemes, e.g., AES, were not proven to be secure. One technique to enhance security is robust combiners. A...
Amir Herzberg, Haya Shulman
ROBOCUP
2005
Springer
120views Robotics» more  ROBOCUP 2005»
14 years 2 months ago
Comparing Sensor Fusion Techniques for Ball Position Estimation
In robotic soccer a good ball position estimate is essential for successful play. Given the uncertainties in the perception of each individual robot, merging the local perceptions ...
Alexander Ferrein, Lutz Hermanns, Gerhard Lakemeye...