Sciweavers

283 search results - page 41 / 57
» pervasive 2007
Sort
View
TRUSTBUS
2007
Springer
14 years 25 days ago
The Meaning of Logs
While logging events is becoming increasingly common in computing, in communication and in collaborative environments, log systems need to satisfy increasingly challenging (if not ...
Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin
DATE
2007
IEEE
146views Hardware» more  DATE 2007»
14 years 1 months ago
DFM/DFY: should you trust the surgeon or the family doctor?
Everybody agrees that curing DFM/DFY issues is of paramount importance at 65 nanometers and beyond. Unfortunately, there is disagreement about how and when to cure them. “Surgeo...
Marco Casale-Rossi, Andrzej J. Strojwas, Robert C....
VLDB
2007
ACM
295views Database» more  VLDB 2007»
14 years 25 days ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
13 years 10 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
FIW
2007
123views Communications» more  FIW 2007»
13 years 8 months ago
Composing Features by Managing Inconsistent Requirements
Abstract. One approach to system development is to decompose the requirements into features and specify the individual features before composing them. A major limitation of deferri...
Robin C. Laney, Thein Than Tun, Michael Jackson, B...