Sciweavers

285 search results - page 42 / 57
» Formalization of Network Quality-of-Service Requirements
Sort
View
NDSS
2009
IEEE
15 years 8 months ago
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan ...
ICMCS
2008
IEEE
120views Multimedia» more  ICMCS 2008»
15 years 8 months ago
Using Semantic Graphs for Image Search
In this paper, we propose a Semantic Graphs for Image Search (SGIS) system, which provides a novel way for image search by utilizing collaborative knowledge in Wikipedia and netwo...
Jyh-Ren Shieh, Yang-Ting Yeh, Chih-Hung Lin, Ching...
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
15 years 8 months ago
PPAA: Peer-to-Peer Anonymous Authentication
In the pursuit of authentication schemes that balance user privacy and accountability, numerous anonymous credential systems have been constructed. However, existing systems assume...
Patrick P. Tsang, Sean W. Smith
ICC
2007
IEEE
113views Communications» more  ICC 2007»
15 years 8 months ago
Complexity and Error Propagation of Localization Using Interferometric Ranging
— An interferometric ranging technique has been recently proposed as a possible way to localize ad hoc and sensor networks. Compared to the more common techniques such as receive...
Rui Huang, Gergely V. Záruba, Manfred Huber
ICDCSW
2006
IEEE
15 years 8 months ago
Wearable Computer for Ubiquitous Informal Communication
The rapid progress of information technology has spurred development of various communication support systems. In particular, the importance of informal communication has lately d...
Shun'ichi Tano, Tatsuhiro Takayama, Mitsuru Iwata,...