Sciweavers

211 search results - page 36 / 43
» Privacy Protected Query Processing on Spatial Networks
Sort
View
SACMAT
2004
ACM
14 years 2 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
CCS
2007
ACM
14 years 3 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
SP
2010
IEEE
327views Security Privacy» more  SP 2010»
14 years 29 days ago
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow
– With software-as-a-service becoming mainstream, more and more applications are delivered to the client through the Web. Unlike a desktop application, a web application is split...
Shuo Chen, Rui Wang, XiaoFeng Wang, Kehuan Zhang
MTA
2007
183views more  MTA 2007»
13 years 8 months ago
The design of a wireless real-time visual surveillance system
In this paper, we study the important issues in the design of an efficient WIreless real-time visual SurveillancE System (WISES). Two important considerations are to minimize: (1)...
Kam-yiu Lam, Calvin K. H. Chiu
SSD
2007
Springer
243views Database» more  SSD 2007»
14 years 3 months ago
Continuous Medoid Queries over Moving Objects
In the k-medoid problem, given a dataset P, we are asked to choose k points in P as the medoids. The optimal medoid set minimizes the average Euclidean distance between the points ...
Stavros Papadopoulos, Dimitris Sacharidis, Kyriako...