Sciweavers

1407 search results - page 156 / 282
» Systems Theory Model for Information Security
Sort
View
AMW
2011
12 years 12 months ago
Private Database Synthesis for Outsourced System Evaluation
The goal of this paper is to permit secure outsourced system evaluation. We propose a method for generating synthetic databases and obfuscating a workload of queries in order to pr...
Vani Gupta, Gerome Miklau, Neoklis Polyzotis
TKDE
2010
164views more  TKDE 2010»
13 years 6 months ago
Defeasible Contextual Reasoning with Arguments in Ambient Intelligence
Abstract—The imperfect nature of context in Ambient Intelligence environments and the special characteristics of the entities that possess and share the available context informa...
Antonis Bikakis, Grigoris Antoniou
COCO
2008
Springer
97views Algorithms» more  COCO 2008»
13 years 10 months ago
Generalized Tsirelson Inequalities, Commuting-Operator Provers, and Multi-prover Interactive Proof Systems
A central question in quantum information theory and computational complexity is how powerful nonlocal strategies are in cooperative games with imperfect information, such as mult...
Tsuyoshi Ito, Hirotada Kobayashi, Daniel Preda, Xi...
OOPSLA
1992
Springer
14 years 11 days ago
CACL: Efficient Fine-Grained Protection for Objects
CACL is a protection scheme for objects that offers a simple and flexible model of protection and has an efficient, software-only implementation. The model, based on Access Contro...
Joel E. Richardson, Peter M. Schwarz, Luis-Felipe ...
CDC
2008
IEEE
114views Control Systems» more  CDC 2008»
14 years 2 months ago
A repetitive process approach to the control of self-servowriting in disk drives
Abstract— This paper considers the control problem for selfservowriting in disk drives where information propagation occurs in two independent directions, i.e. time and track num...
Krzysztof Galkowski, Wojciech Paszke, Eric Rogers