Sciweavers

24529 search results - page 253 / 4906
» Computing on Authenticated Data
Sort
View
97
Voted
DMG
2005
Springer
15 years 9 months ago
File Caching in Data Intensive Scientific Applications on Data-Grids
Ekow J. Otoo, Doron Rotem, Alexandru Romosan, Srid...
93
Voted
IPPS
2000
IEEE
15 years 8 months ago
Parallel Data Mining of Bayesian Networks from Telecommunications Network Data
Roy Sterritt, Kenneth Adamson, Mary Shapcott, Edwi...
102
Voted
CONEXT
2010
ACM
15 years 1 months ago
Personal data vaults: a locus of control for personal data streams
Min Mun, Shuai Hao, Nilesh Mishra, Katie Shilton, ...
143
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Secure Range Queries in Tiered Sensor Networks
—We envision a two-tier sensor network which consists of resource-rich master nodes at the upper tier and resourcepoor sensor nodes at the lower tier. Master nodes collect data f...
Jing Shi, Rui Zhang, Yanchao Zhang
187
Voted
TWC
2011
417views more  TWC 2011»
14 years 10 months ago
A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
Abstract—We target a two-tier sensor network with resourcerich master nodes at the upper tier and resource-poor sensor nodes at the lower tier. Master nodes collect data from sen...
Jing Shi, Rui Zhang, Yanchao Zhang