Sciweavers

5255 search results - page 207 / 1051
» Formal Methods for Privacy
Sort
View
MDM
2010
Springer
301views Communications» more  MDM 2010»
15 years 8 months ago
Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services
Abstract—Location obfuscation using cloaking regions preserves location anonymity by hiding the true user among a set of other equally likely users. Furthermore, a cloaking regio...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
169
Voted
PODS
2011
ACM
229views Database» more  PODS 2011»
14 years 6 months ago
On the complexity of privacy-preserving complex event processing
Complex Event Processing (CEP) Systems are stream processing systems that monitor incoming event streams in search of userspecified event patterns. While CEP systems have been ad...
Yeye He, Siddharth Barman, Di Wang, Jeffrey F. Nau...
FORMATS
2007
Springer
15 years 7 months ago
Combining Formal Verification with Observed System Execution Behavior to Tune System Parameters
Resource limited DRE (Distributed Real-time Embedded) systems can benefit greatly from dynamic adaptation of system parameters. We propose a novel approach that employs iterative t...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...
SIGMOD
2003
ACM
147views Database» more  SIGMOD 2003»
16 years 4 months ago
Formal semantics and analysis of object queries
Modern database systems provide not only powerful data models but also complex query languages supporting powerful features such as the ability to create new database objects and ...
Gavin M. Bierman
WISE
2009
Springer
16 years 1 months ago
Formal Identification of Right-Grained Services for Service-Oriented Modeling
Identifying the right-grained services is important to lead the successful service orientation because it has a direct impact on two major goals: the composability of loosely-coupl...
Yukyong Kim, Kyung-Goo Doh