Sciweavers

887 search results - page 128 / 178
» A Time for Choosing
Sort
View
ICDCS
2011
IEEE
13 years 9 months ago
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
— In the emerging cloud computing paradigm, data owners become increasingly motivated to outsource their complex data management systems from local sites to the commercial public...
Ning Cao, Zhenyu Yang, Cong Wang, Kui Ren, Wenjing...
COMSNETS
2012
183views more  COMSNETS 2012»
13 years 5 months ago
Effects of network trace sampling methods on privacy and utility metrics
—Researchers choosing to share wireless-network traces with colleagues must first anonymize sensitive information, trading off the removal of information in the interest of iden...
Phil Fazio, Keren Tan, David Kotz
ICDCSW
2005
IEEE
15 years 3 months ago
Framework and Rule-Based Language for Facilitating Context-Aware Computing Using Information Appliances
Recently, context-aware computing with information appliances is the topic of many research efforts. In order to realize context-aware systems, it is necessary to describe rules, ...
Kouji Nishigaki, Keiichi Yasumoto, Naoki Shibata, ...
HICSS
2007
IEEE
148views Biometrics» more  HICSS 2007»
15 years 4 months ago
Binding Now or Binding Later: The Performance of UDDI Registries
In service-oriented environments, the fluidity of the marketplace introduces changes in service offerings and subsequent connection failures for users still bound to outdated serv...
M. Brian Blake, Amy Lynn Sliva, Michael zur Muehle...
SIGMOD
2012
ACM
223views Database» more  SIGMOD 2012»
13 years 10 days ago
MaskIt: privately releasing user context streams for personalized mobile applications
The rise of smartphones equipped with various sensors has enabled personalization of various applications based on user contexts extracted from sensor readings. At the same time i...
Michaela Götz, Suman Nath, Johannes Gehrke