Sciweavers

3134 search results - page 316 / 627
» Computing full disjunctions
Sort
View
SDMW
2010
Springer
15 years 1 months ago
Joining Privately on Outsourced Data
In an outsourced database framework, clients place data management with specialized service providers. Of essential concern in such frameworks is data privacy. Potential clients ar...
Bogdan Carbunar, Radu Sion
TCS
2010
15 years 1 months ago
Strong normalization property for second order linear logic
The paper contains the first complete proof of strong normalization (SN) for full second order linear logic (LL): Girard’s original proof uses a standardization theorem which i...
Michele Pagani, Lorenzo Tortora de Falco
TISSEC
2010
121views more  TISSEC 2010»
15 years 1 months ago
Privacy-aware role-based access control
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. Therefore, the definition of an expressive and easy-to-use privacyre...
Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie,...
WCNC
2010
IEEE
15 years 1 months ago
Localisation of Wireless LAN Nodes Using Accurate TDoA Measurements
—Time based localisation methods like GPS are widely used for outdoor navigation, whereas indoor navigation is typically performed only on a cell-basis or based on the Received S...
Reinhard Exel, Georg Gaderer, Patrick Loschmidt
EGH
2010
Springer
15 years 1 months ago
Restart trail for stackless BVH traversal
A ray cast algorithm utilizing a hierarchical acceleration structure needs to perform a tree traversal in the hierarchy. In its basic form, executing the traversal requires a stac...
Samuli Laine