Sciweavers

392 search results - page 20 / 79
» Privacy Requirement Modeling and Verification in Cloud Compu...
Sort
View
POLICY
2005
Springer
14 years 3 months ago
Deriving Semantic Models from Privacy Policies
Natural language policies describe interactions between and across organizations, third-parties and individuals. However, current policy languages are limited in their ability to ...
Travis D. Breaux, Annie I. Antón
IACR
2011
158views more  IACR 2011»
12 years 10 months ago
Can Homomorphic Encryption be Practical?
Abstract. The prospect of outsourcing an increasing amount of data storage and management to cloud services raises many new privacy concerns for individuals and businesses alike. T...
Kristin Lauter, Michael Naehrig, Vinod Vaikuntanat...
CGI
2001
IEEE
14 years 2 months ago
Modeling and Rendering of Various Natural Phenomena Consisting of Particles
The simulation of various natural phenomena is one of the important research fields in computer graphics. In particular, aspects such as sky, clouds, water, fire, trees, smoke, te...
Tomoyuki Nishita, Yoshinori Dobashi
VLSID
2003
IEEE
180views VLSI» more  VLSID 2003»
14 years 10 months ago
Automating Formal Modular Verification of Asynchronous Real-Time Embedded Systems
Most verification tools and methodologies such as model checking, equivalence checking, hardware verification, software verification, and hardware-software coverification often fl...
Pao-Ann Hsiung, Shu-Yu Cheng
ICC
2009
IEEE
130views Communications» more  ICC 2009»
13 years 8 months ago
Verification of Secret Key Generation from UWB Channel Observations
Theoretical models of ultrawideband (UWB) radio channels indicate that pairs of UWB radio transceivers measure their common radio channel with a high degree of agreement and third ...
Masoud Ghoreishi Madiseh, Shuai He, Michael L. McG...