Sciweavers

1099 search results - page 123 / 220
» Time management for new faculty
Sort
View
ADC
2009
Springer
175views Database» more  ADC 2009»
14 years 4 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
IDEAS
2008
IEEE
109views Database» more  IDEAS 2008»
14 years 4 months ago
EXsum: an XML summarization framework
1 We propose a new framework for the summarization of XML document properties called EXsum (Element-wise XML summarization), which can capture statistical information of all import...
José de Aguiar Moraes Filho, Theo Härd...
ICMCS
2007
IEEE
136views Multimedia» more  ICMCS 2007»
14 years 4 months ago
An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image
Some (k, n)-threshold image secret sharing schemes encrypt the secret image into n noise-like shadow images with size 1/k times that of the original secret image. The small size o...
Ching-Nung Yang, Tse-Shih Chen
IPPS
2007
IEEE
14 years 4 months ago
Adaptive Distributed Database Replication Through Colonies of Pogo Ants
We address the problem of optimizing the distribution of partially replicated databases over a computer network. Replication is used to increase data availability in the presence ...
Sarah Abdul-Wahid, Razvan Andonie, Joseph Lemley, ...
STORAGESS
2006
ACM
14 years 4 months ago
Secure deletion myths, issues, and solutions
This paper has three goals. (1) We try to debunk several held misconceptions about secure deletion: that encryption is an ideal solution for everybody, that existing data-overwrit...
Nikolai Joukov, Harry Papaxenopoulos, Erez Zadok