Sciweavers

10493 search results - page 1780 / 2099
» Dynamic Word Problems
Sort
View
SP
2008
IEEE
100views Security Privacy» more  SP 2008»
15 years 9 months ago
Towards Practical Privacy for Genomic Computation
Many basic tasks in computational biology involve operations on individual DNA and protein sequences. These sequences, even when anonymized, are vulnerable to re-identification a...
Somesh Jha, Louis Kruger, Vitaly Shmatikov
SUTC
2008
IEEE
15 years 9 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
TASE
2008
IEEE
15 years 9 months ago
Reasoning about Channel Passing in Choreography
Abstract Web services choreography describes global models of service interactions among a set of participants. For an interaction to be executed, the participants taken part in it...
Hongli Yang, Chao Cai, Liyang Peng, Xiangpeng Zhao...
VR
2008
IEEE
136views Virtual Reality» more  VR 2008»
15 years 9 months ago
Uncertainty Boundaries for Complex Objects in Augmented Reality
Registration errors between the physical world and computergenerated objects are a central problem in Augmented Reality (AR) systems. Some existing AR systems have demonstrated ho...
Jiajian Chen, Blair MacIntyre
125
Voted
WCNC
2008
IEEE
15 years 9 months ago
Adaptive Split Transmission for Video Streams in Wireless Mesh Networks
— Wireless mesh networks hold great promise in the wireless transmission of video flows, particularly if the problem of providing sufficient network capacity can be addressed. ...
Wanqing Tu, Cormac J. Sreenan
« Prev « First page 1780 / 2099 Last » Next »