Sciweavers

922 search results - page 113 / 185
» Attribute based data sharing with attribute revocation
Sort
View
SP
2007
IEEE
105views Security Privacy» more  SP 2007»
15 years 6 months ago
Multi-Dimensional Range Query over Encrypted Data
We design an encryption scheme called Multi-dimensional Range Query over Encrypted Data (MRQED), to address the privacy concerns related to the sharing of network audit logs and v...
Elaine Shi, John Bethencourt, Hubert T.-H. Chan, D...
ICDE
2009
IEEE
143views Database» more  ICDE 2009»
16 years 1 months ago
Fa: A System for Automating Failure Diagnosis
Abstract-Failures of Internet services and enterprise systems lead to user dissatisfaction and considerable loss of revenue. Since manual diagnosis is often laborious and slow, the...
Songyun Duan, Shivnath Babu, Kamesh Munagala
KDD
2002
ACM
130views Data Mining» more  KDD 2002»
16 years 8 days ago
Learning domain-independent string transformation weights for high accuracy object identification
The task of object identification occurs when integrating information from multiple websites. The same data objects can exist in inconsistent text formats across sites, making it ...
Sheila Tejada, Craig A. Knoblock, Steven Minton
SG
2009
Springer
15 years 6 months ago
Interactive Context-Aware Visualization for Mobile Devices
Abstract. Utilizing context information—e.g. location, user aspects, or hardware capabilities—enables the presented generic framework to automatically control the selection and...
Mike Eissele, Daniel Weiskopf, Thomas Ertl
ICMCS
2008
IEEE
173views Multimedia» more  ICMCS 2008»
15 years 6 months ago
Improvement of the embedding efficiency of LSB matching by sum and difference covering set
As an important attribute directly influencing the steganographic scheme, the embedding efficiency is defined as the average number of random data bits per one embedding change...
Xiaolong Li, Tieyong Zeng, Bin Yang