Sciweavers

15379 search results - page 219 / 3076
» Protecting users from
Sort
View
CSE
2009
IEEE
14 years 1 days ago
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing
A user stores his personal files in a cloud, and retrieves them wherever and whenever he wants. For the sake of protecting the user data privacy and the user queries privacy, a use...
Qin Liu, Guojun Wang, Jie Wu
IV
2010
IEEE
166views Visualization» more  IV 2010»
13 years 6 months ago
From Databases to Graph Visualization
The first step of any information visualization system is to enable end user to import their dataset into the system. However, non expert user are faced to the difficult task of ch...
Frédéric Gilbert, David Auber
ICITA
2005
IEEE
14 years 1 months ago
Searching the Web: From Keywords to Semantic Queries
Within the emergent Semantic Web framework, the use of traditional web search engines based on keywords provided by the users is not adequate anymore. Instead, new methods based o...
José A. Royo, Eduardo Mena, Jorge Bernad, A...
INTERACT
2003
13 years 9 months ago
Project InfoSpace: From Information Managing to Information Representation
: The Desktop metaphor has repeatedly been declared antiquated in various ways. It nevertheless continues existing. Despite the widely pronounced critique, it is still not clear wh...
Pamela Ravasio, Ljiljana Vukelja, Gabrio Rivera, M...
INFOCOM
2008
IEEE
14 years 2 months ago
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
—Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network s...
Jinyuan Sun, Chi Zhang, Yuguang Fang