Sciweavers

2024 search results - page 385 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
SIGMOD
2002
ACM
198views Database» more  SIGMOD 2002»
14 years 8 months ago
Processing complex aggregate queries over data streams
Recent years have witnessed an increasing interest in designing algorithms for querying and analyzing streaming data (i.e., data that is seen only once in a fixed order) with only...
Alin Dobra, Minos N. Garofalakis, Johannes Gehrke,...
ICHIM
2001
190views more  ICHIM 2001»
13 years 10 months ago
Chromatic Adaptation Post-Filtering in Image Synthesis Reproduction of Ancient Building for Restoration Support
Within the field of cultural heritage restoration, experts are interested in the analysis of data describing the condition and history of ancient monuments. Data are usually distr...
Maurizio Rossi, Daniele Marini, Alessandro Rizzi
ISW
2009
Springer
14 years 3 months ago
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
The frequency and severity of a number of recent intrusions involving data theft and leakages has shown that online users’ trust, voluntary or not, in the ability of third partie...
Matthew Burnside, Angelos D. Keromytis
TPDS
2008
116views more  TPDS 2008»
13 years 8 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
MOBISYS
2008
ACM
14 years 8 months ago
Detecting energy-greedy anomalies and mobile malware variants
Mobile users of computation and communication services have been rapidly adopting battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work. However, the...
Hahnsang Kim, Joshua Smith, Kang G. Shin