Sciweavers

1369 search results - page 223 / 274
» A Practical Implementation of the Timing Attack
Sort
View
97
Voted
DCOSS
2008
Springer
15 years 2 months ago
Frugal Sensor Assignment
When a sensor network is deployed in the field it is typically required to support multiple simultaneous missions, which may start and finish at different times. Schemes that match...
Matthew P. Johnson, Hosam Rowaihy, Diego Pizzocaro...
121
Voted
ACSW
2007
15 years 2 months ago
The motivation and proposition of a privacy-enhancing architecture for operational databases
To date, research has focussed on privacy from a wide perspective, enabling organisations to implement various technologies that contribute to privacy protection. However, in such...
Kirsten Wahlstrom, Gerald Quirchmayr
101
Voted
APBC
2007
110views Bioinformatics» more  APBC 2007»
15 years 2 months ago
Fast Structural Similarity Search Based on Topology String Matching
ibe an abstract data model of protein structures by representing the geometry of proteins using spatial data types and present a framework for fast structural similarity search bas...
Sung-Hee Park, David Gilbert, Keun Ho Ryu
106
Voted
NETWORKING
2010
15 years 2 months ago
Synapse: A Scalable Protocol for Interconnecting Heterogeneous Overlay Networks
This paper presents Synapse, a scalable protocol for information retrieval over the inter-connection of heterogeneous overlay networks. Applications on top of Synapse see those int...
Luigi Liquori, Cédric Tedeschi, Laurent Van...
MEDINFO
2007
129views Healthcare» more  MEDINFO 2007»
15 years 2 months ago
Confidentiality Preserving Audits of Electronic Medical Record Access
Failure to supply a care provider with timely access to a patient's medical record can lead to patient harm or death. As such, healthcare organizations often endow care provi...
Bradley Malin, Edoardo Airoldi