Sciweavers

1051 search results - page 168 / 211
» group 2009
Sort
View
CIDR
2009
157views Algorithms» more  CIDR 2009»
13 years 10 months ago
Capturing Data Uncertainty in High-Volume Stream Processing
We present the design and development of a data stream system that captures data uncertainty from data collection to query processing to final result generation. Our system focuse...
Yanlei Diao, Boduo Li, Anna Liu, Liping Peng, Char...
CIMAGING
2009
141views Hardware» more  CIMAGING 2009»
13 years 10 months ago
Personal dietary assessment using mobile devices
Dietary intake provides valuable insights for mounting intervention programs for prevention of disease. With growing concern for adolescent obesity, the need to accurately measure...
Anand Mariappan, Marc Bosch, Fengqing Zhu, Carol J...
CSE
2009
IEEE
13 years 10 months ago
Social Relationship Identification: An Example of Social Query
Every moment, millions of people worldwide are communicating and sharing content online. We express ourselves online to enrich existing relationships and establish new relationship...
Christopher P. Diehl, Jaime Montemayor, Michael Pe...
PAIRING
2010
Springer
116views Cryptology» more  PAIRING 2010»
13 years 8 months ago
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts
Lewko and Waters [Eurocrypt 2010] presented a fully secure HIBE with short ciphertexts. In this paper we show how to modify their construction to achieve anonymity. We prove the s...
Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano
ACSAC
2009
IEEE
13 years 7 months ago
RoleVAT: Visual Assessment of Practical Need for Role Based Access Control
Abstract--Role based access control (RBAC) is a powerful security administration concept that can simplify permission assignment management. Migration to and maintenance of RBAC re...
Dana Zhang, Kotagiri Ramamohanarao, Steven Verstee...