Sciweavers

271 search results - page 31 / 55
» Access control over uncertain data
Sort
View
79
Voted
ICIP
2010
IEEE
14 years 7 months ago
Security analysis for privacy preserving search of multimedia
With the increasing popularity of digital multimedia such as images and videos and the advent of the cloud computing paradigm, a fast growing amount of private and sensitive multi...
Wenjun Lu, Avinash L. Varna, Min Wu
PEWASUN
2004
ACM
15 years 3 months ago
A simulation study on multi-rate mobile ad hoc networks
This paper studies the performance of a multi-rate mobile ad hoc network (MANET) using an extended ns-2 simulator. A link adaptation algorithm is developed and tested. The multi-r...
Gang Ding, Xiaoxin Wu, Bharat K. Bhargava
RTCSA
2009
IEEE
15 years 4 months ago
Towards Hardware Support for Common Sensor Processing Tasks
—Sensor processing is a common task within many embedded system domains, such as in control systems, the sensor feedback is used for actuator control. In this paper we have surve...
Adwait Gupte, Phillip Jones
WETICE
2003
IEEE
15 years 2 months ago
WebDAVA: An Administrator-Free Approach To Web File-Sharing
Collaboration over the Internet depends on the ability of the members of a group to exchange data in a secure yet unobtrusive manner. WebDAVA is a system that allows users to deï¬...
Alexander Levine, Vassilis Prevelakis, John Ioanni...
82
Voted
STORAGESS
2006
ACM
15 years 3 months ago
Scalable security for large, high performance storage systems
New designs for petabyte-scale storage systems are now capable of transferring hundreds of gigabytes of data per second, but lack strong security. We propose a scalable and effici...
Andrew W. Leung, Ethan L. Miller