Sciweavers

2079 search results - page 221 / 416
» Quantifying Information Flow
Sort
View
SIGMOD
2010
ACM
155views Database» more  SIGMOD 2010»
13 years 7 months ago
Search in social networks with access control
More and more important data is accumulated inside social networks. Limiting the flow of private information across a social network is very important, and most social networks pr...
Truls Amundsen Bjørklund, Michaela Göt...
WIOPT
2010
IEEE
13 years 7 months ago
Delay efficient scheduling via redundant constraints in multihop networks
Abstract--We consider the problem of delay-efficient scheduling in general multihop networks. While the class of max-weight type algorithms are known to be throughput optimal for t...
Longbo Huang, Michael J. Neely
IPAW
2010
13 years 7 months ago
Securing Provenance-Based Audits
Given the significant increase of on-line services that require personal information from users, the risk that such information is misused has become an important concern. In such ...
Rocío Aldeco-Pérez, Luc Moreau

Publication
3320views
15 years 8 months ago
Image Inpainting with the Navier-Stokes Equations
Image inpaining "involves filling in part of an image (or video) using information for the surrounding area" [1]. This report summarizes an application of numerical sol...
Wilson Au, Ryo Takei
ICDE
2008
IEEE
149views Database» more  ICDE 2008»
14 years 11 months ago
Orchid: Integrating Schema Mapping and ETL
This paper describes Orchid, a system that converts declarative mapping specifications into data flow specifications s) and vice versa. Orchid provides an abstract operator model t...
Stefan Dessloch, Mauricio A. Hernández, Rya...