Sciweavers

1065 search results - page 5 / 213
» The Design of PIRS, a Peer-to-Peer Information Retrieval Sys...
Sort
View
CCS
2004
ACM
14 years 24 days ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon
P2P
2010
IEEE
132views Communications» more  P2P 2010»
13 years 5 months ago
Towards Plugging Privacy Leaks in the Domain Name System
—Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals – to one or more DNS servers â...
Yanbin Lu, Gene Tsudik
SIGMOD
2008
ACM
210views Database» more  SIGMOD 2008»
14 years 7 months ago
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must n...
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, C...
COMPSAC
2008
IEEE
14 years 1 months ago
OntoArch Approach for Reliability-Aware Software Architecture Development
Reliability-aware software architecture development has recently been gaining growing attention among software architects. This paper tackles the issue by introducing an ontology-...
Jiehan Zhou, Eila Niemelä, Antti Evesti, Anne...
CORR
2010
Springer
218views Education» more  CORR 2010»
13 years 4 months ago
User Centered and Ontology Based Information Retrieval System for Life Sciences
Because of the increasing number of electronic data, designing efficient tools to retrieve and exploit documents is a major challenge. Current search engines suffer from two main d...
Sylvie Ranwez, Vincent Ranwez, Mohameth-Fran&ccedi...