Sciweavers

1512 search results - page 264 / 303
» Principles of IEEE 802.11s
Sort
View
CSFW
2011
IEEE
12 years 8 months ago
Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection
Abstract—Audit mechanisms are essential for privacy protection in permissive access control regimes, such as in hospitals where denying legitimate access requests can adversely a...
Jeremiah Blocki, Nicolas Christin, Anupam Datta, A...
DSN
2011
IEEE
12 years 8 months ago
Approximate analysis of blocking queueing networks with temporal dependence
—In this paper we extend the class of MAP queueing networks to include blocking models, which are useful to describe the performance of service instances which have a limited con...
Vittoria de Nitto Persone, Giuliano Casale, Evgeni...
ICDCS
2011
IEEE
12 years 8 months ago
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
— In the emerging cloud computing paradigm, data owners become increasingly motivated to outsource their complex data management systems from local sites to the commercial public...
Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, Wenjing...
CSE
2012
IEEE
12 years 4 months ago
Accelerating Quantum Monte Carlo Simulations of Real Materials on GPU Clusters
—Continuum quantum Monte Carlo (QMC) has proved to be an invaluable tool for predicting the properties of matter from fundamental principles. By solving the manybody Schr¨odinge...
Kenneth Esler, Jeongnim Kim, David M. Ceperley, Lu...
HICSS
2012
IEEE
285views Biometrics» more  HICSS 2012»
12 years 4 months ago
Identifying Informational Needs for Open Government: The Case of Egypt
The success of open government initiatives depends on understanding the informational needs of the concerned citizens and other stakeholders as prerequisite for open access to rel...
Ralf Klischewski