Sciweavers

5344 search results - page 940 / 1069
» Privacy-Preserving Set Operations
Sort
View
143
Voted
GLOBECOM
2010
IEEE
15 years 1 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
142
Voted
ICDE
2010
IEEE
220views Database» more  ICDE 2010»
15 years 1 months ago
Profiling linked open data with ProLOD
Linked open data (LOD), as provided by a quickly growing number of sources constitutes a wealth of easily accessible information. However, this data is not easy to understand. It i...
Christoph Böhm, Felix Naumann, Ziawasch Abedj...
AMSTERDAM
2009
15 years 1 months ago
Modified Numerals as Post-Suppositions
The paper provides a compositional account of cumulative readings with non-increasing modified numerals (aka van Benthem's puzzle), e.g., Exactly three boys saw exactly five m...
Adrian Brasoveanu
DC
2010
15 years 1 days ago
Rambo: a robust, reconfigurable atomic memory service for dynamic networks
In this paper, we present RAMBO, an algorithm for emulating a read/write distributed shared memory in a dynamic, rapidly changing environment. RAMBO provides a highly reliable, hi...
Seth Gilbert, Nancy A. Lynch, Alexander A. Shvarts...
CORR
2011
Springer
245views Education» more  CORR 2011»
14 years 10 months ago
Joint Distributed Access Point Selection and Power Allocation in Cognitive Radio Networks
Spectrum management has been identified as a crucial step towards enabling the technology of the cognitive radio network (CRN). Most of the current works dealing with spectrum ma...
Mingyi Hong, Alfredo Garcia, Jorge Alviar