Sciweavers

2259 search results - page 151 / 452
» Separation and information hiding
Sort
View
ESORICS
2011
Springer
12 years 10 months ago
A Light-Weight Solution to Preservation of Access Pattern Privacy in Un-trusted Clouds
Abstract. Cloud computing is a new computing paradigm that is gaining increased popularity. More and more sensitive user data are stored in the cloud. The privacy of users’ acces...
Ka Yang, Jinsheng Zhang, Wensheng Zhang, Daji Qiao
HICSS
2009
IEEE
176views Biometrics» more  HICSS 2009»
14 years 5 months ago
The Effects of Culture of Adoption of Telemedicine in Medically Underserved Communities
Within the information systems discipline, three streams have emerged that address the issue of information technology adoption, diffusion and use. The first examines the factors ...
Stacie N. Nwabueze, Peter Meso, Victor Wacham A. M...
VLDB
2004
ACM
105views Database» more  VLDB 2004»
14 years 3 months ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...
ICIP
2000
IEEE
14 years 11 months ago
Geometric and Topological Lossy Compression of Dense Range Images
This paper presents a technique for lossy compression of dense range images. Two separate compression schemes are applied. The first scheme (geometric compression) reduces redunda...
Angel Domingo Sappa, Boris Xavier Vintimilla, Migu...
ICMCS
2006
IEEE
142views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Distributed Streaming via Packet Partitioning
We propose a system for adaptive streaming from multiple servers to a single receiver over separate network paths. Based on incoming packets, the receiver estimates the available ...
Jacob Chakareski, Pascal Frossard