Sciweavers

2050 search results - page 265 / 410
» constraints 2010
Sort
View
TIP
2010
107views more  TIP 2010»
13 years 5 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
SECRYPT
2010
129views Business» more  SECRYPT 2010»
13 years 8 months ago
EnCoRe: Towards a Holistic Approach to Privacy
: EnCoRe: Towards a holistic approach to privacy Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson HP Laboratories HPL-2010-83 privacy policies...
Nick Papanikolaou, Sadie Creese, Michael Goldsmith...
SAC
2010
ACM
14 years 3 months ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper
ICSOC
2010
Springer
13 years 8 months ago
Automatic Fragment Identification in Workflows Based on Sharing Analysis
In Service-Oriented Computing (SOC), fragmentation and merging of workflows are motivated by a number of concerns, among which we can cite design issues, performance, and privacy. ...
Dragan Ivanovic, Manuel Carro, Manuel V. Hermenegi...
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 10 months ago
High-SIR Transmission Capacity of Wireless Networks with General Fading and Node Distribution
In many wireless systems, interference is the main performance-limiting factor, and is primarily dictated by the locations of concurrent transmitters. In many earlier works, the l...
Radha Krishna Ganti, Jeffrey G. Andrews, Martin Ha...