Sciweavers

807 search results - page 96 / 162
» Term Rewriting for Access Control
Sort
View
145
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
Price of Anarchy for Cognitive MAC Games
—In this paper, we model and analyze the interactions between secondary users in a spectrum overlay cognitive system as a cognitive MAC game. In this game, each secondary user ca...
Lok Man Law, Jianwei Huang, Mingyan Liu, Shuo-Yen ...
143
Voted
CCS
2011
ACM
14 years 3 months ago
Practical PIR for electronic commerce
We extend Goldberg’s multi-server information-theoretic private information retrieval (PIR) with a suite of protocols for privacypreserving e-commerce. Our first protocol adds ...
Ryan Henry, Femi G. Olumofin, Ian Goldberg
WWW
2009
ACM
16 years 4 months ago
Retaining personal expression for social search
Web is being extensively used for personal expression, which includes ratings, reviews, recommendations, blogs. This user created content, e.g. book review on Amazon.com, becomes ...
Praphul Chandra, Ajay Gupta
PERCOM
2009
ACM
15 years 10 months ago
Implementation of a MAC Protocol for QoS Support in Wireless Sensor Networks
— Future application areas of wireless sensor networks (WSNs) may include industrial process automation, aircraft control systems or patient monitoring in hospitals. Such applica...
Petcharat Suriyachai, Utz Roedig, Andrew Scott
HASE
2008
IEEE
15 years 10 months ago
An Interaction-Based Test Sequence Generation Approach for Testing Web Applications
Web applications often use dynamic pages that interact with each other by accessing shared objects, e.g., session objects. Interactions between dynamic pages need to be carefully ...
Wenhua Wang, Sreedevi Sampath, Yu Lei, Raghu Kacke...