Sciweavers

2199 search results - page 336 / 440
» Adapting Privacy-Preserving Computation to the Service Provi...
Sort
View
105
Voted
SACMAT
2009
ACM
15 years 7 months ago
Foundations for group-centric secure information sharing models
We develop the foundations for a theory of Group-Centric Secure Information Sharing (g-SIS), characterize a specific family of models in this arena and identify several direction...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...
169
Voted
VLDB
2007
ACM
295views Database» more  VLDB 2007»
15 years 6 months ago
From Data Privacy to Location Privacy: Models and Algorithms
This tutorial presents the definition, the models and the techniques of location privacy from the data privacy perspective. By reviewing and revising the state of art research in ...
Ling Liu
P2PKM
2004
15 years 2 months ago
A Space-Efficient Model for Sharing Personal Knowledge Objects in Peer Communities
Abstract. In the future it is likely that peer communities will be routinely established for the purpose of sharing electronic resources and targeted information among groups of pe...
Fred S. Annexstein, Kenneth A. Berman
OR
2010
Springer
14 years 11 months ago
Modeling organic carbon and carbon-mediated soil processes in DSSAT v4.5
Cropping systems models have evolved over the last four decades in response to the demand for modeling to address more complex questions, including issues on sustainable productio...
Cheryl H. Porter, J. W. Jones, S. Adiku, A. J. Gij...
DSN
2008
IEEE
15 years 7 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...