Sciweavers

2954 search results - page 430 / 591
» Beyond
Sort
View
147
Voted
WIOPT
2010
IEEE
15 years 3 months ago
Spatial queueing analysis for mobility in pico cell networks
In this work, we characterize the performance of pico cell networks in presence of moving users. We model various traffic types between base-stations and mobiles as different typ...
Sreenath Ramanath, Veeraruna Kavitha, Eitan Altman
145
Voted
WS
2010
ACM
15 years 3 months ago
DLEJena: A practical forward-chaining OWL 2 RL reasoner combining Jena and Pellet
This paper describes DLEJena, a practical reasoner for the OWL 2 RL profile that combines the forward-chaining rule engine of Jena and the Pellet DL reasoner. This combination is...
Georgios Meditskos, Nick Bassiliades
159
Voted
ASIACRYPT
2010
Springer
15 years 3 months ago
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Private Set Intersection (PSI) protocols allow one party ("client") to compute an intersection of its input set with that of another party ("server"), such tha...
Emiliano De Cristofaro, Jihye Kim, Gene Tsudik
179
Voted
ATS
2010
IEEE
229views Hardware» more  ATS 2010»
15 years 3 months ago
Variation-Aware Fault Modeling
Abstract--To achieve a high product quality for nano-scale systems both realistic defect mechanisms and process variations must be taken into account. While existing approaches for...
Fabian Hopsch, Bernd Becker, Sybille Hellebrand, I...
BIOSIG
2010
152views Biometrics» more  BIOSIG 2010»
15 years 3 months ago
Biometric Systems in Future Preventive Scenarios - Legal Issues and Challenges
: The privacy and data protection challenges posed by biometric systems have been discussed in detail in the last years. Both security opportunities and privacy risks however may d...
Gerrit Hornung, Monika Desoi, Matthias Pocs