Sciweavers

708 search results - page 125 / 142
» Implementing access control to people location information
Sort
View
SIGMOD
1997
ACM
166views Database» more  SIGMOD 1997»
15 years 3 months ago
The InfoSleuth Project
The goal of the InfoSleuth project at MCC is to exploit and synthesize new technologies into a uni ed system that retrieves and processes information in an ever-changing network o...
Roberto J. Bayardo Jr., William Bohrer, Richard S....
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
14 years 9 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
ICUIMC
2011
ACM
14 years 3 months ago
Opportunities of MIM capture in IEEE 802.11 WLANs: analytic study
Physical layer capture in WLANs makes a receiver to decode a relatively strong packet in a collision. According to recent works, an augmented physical layer capture handles interf...
Joonsoo Lee, Young-myoung Kang, Suchul Lee, Chong-...
IJCAI
2001
15 years 1 months ago
Real-Time Auditory and Visual Multiple-Object Tracking for Humanoids
This paper presents a real-time auditory and visual tracking of multiple objects for humanoid under real-world environments. Real-time processing is crucial for sensorimotor tasks...
Kazuhiro Nakadai, Ken-ichi Hidai, Hiroshi Mizoguch...
BTW
2007
Springer
245views Database» more  BTW 2007»
15 years 6 months ago
From Personal Desktops to Personal Dataspaces: A Report on Building the iMeMex Personal Dataspace Management System
Abstract: We propose a new system that is able to handle the entire Personal Dataspace of a user. A Personal Dataspace includes all data pertaining to a user on all his disks and o...
Jens-Peter Dittrich, Lukas Blunschi, Markus Fä...