Sciweavers

518 search results - page 13 / 104
» Abstract Interpretation-Based Protection
Sort
View
ICC
2007
IEEE
149views Communications» more  ICC 2007»
15 years 6 months ago
1+N Protection Against Multiple Link Failures in Mesh Networks
Abstract—In [1], the author presented a 1+N protection strategy against single link failures using a network coding approach on p-Cycles. In this paper, we extend this approach t...
Ahmed E. Kamal
ESORICS
2006
Springer
15 years 3 months ago
Policy-Driven Memory Protection for Reconfigurable Hardware
Abstract. While processor based systems often enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reconfigurable har...
Ted Huffmire, Shreyas Prasad, Timothy Sherwood, Ry...
MDM
2007
Springer
106views Communications» more  MDM 2007»
15 years 5 months ago
Protecting Moving Trajectories with Dummies
Abstract—Dummy-based anonymization techniques for protecting location privacy of mobile users have been proposed in the literature. By generating dummies that move in humanlike t...
Tun-Hao You, Wen-Chih Peng, Wang-Chien Lee
PSD
2004
Springer
126views Database» more  PSD 2004»
15 years 5 months ago
Outlier Protection in Continuous Microdata Masking
Abstract. Masking methods protect data sets against disclosure by perturbing the original values before publication. Masking causes some information loss (masked data are not exact...
Josep Maria Mateo-Sanz, Francesc Sebé, Jose...
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
16 years 1 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu