Sciweavers

1597 search results - page 149 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
SIGMOD
2007
ACM
144views Database» more  SIGMOD 2007»
14 years 9 months ago
GhostDB: querying visible and hidden data without leaks
Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospita...
Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, Phil...
HIPC
2009
Springer
13 years 7 months ago
Highly scalable algorithm for distributed real-time text indexing
Stream computing research is moving from terascale to petascale levels. It aims to rapidly analyze data as it streams in from many sources and make decisions with high speed and a...
Ankur Narang, Vikas Agarwal, Monu Kedia, Vijay K. ...
WCNC
2008
IEEE
14 years 3 months ago
Combining Cricket System and Inertial Navigation for Indoor Human Tracking
—We present a system-level approach to localizing and tracking users on a basis of different sources of location information. We have applied a combination of the Cricket system ...
Michael Popa, Junaid Ansari, Janne Riihijärvi...
ECBS
2007
IEEE
118views Hardware» more  ECBS 2007»
13 years 11 months ago
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
ICDS
2009
IEEE
14 years 4 months ago
Self Protecting Data for De-perimeterised Information Sharing
- The emergence of high-speed networks, Grid Computing, Service-Oriented Architectures, and an ever increasing ambient connection to mobile Internet has enabled an underpinning inf...
Pete Burnap, Jeremy Hilton