Sciweavers

8701 search results - page 66 / 1741
» Protecting information on the Web
Sort
View
98
Voted
FTDCS
1999
IEEE
15 years 5 months ago
Protecting Competitive Negotiation of Mobile Agents
The paradigm of mobile agents reached its popularity and attraction from typical application scenarios, which are located in the area of electronic commerce. In these common appli...
Hartmut Vogler, Axel Spriestersbach, Marie-Luise M...
115
Voted
MEDINFO
2007
122views Healthcare» more  MEDINFO 2007»
15 years 2 months ago
Protecting Privacy while Sharing Medical Data Between Regional Healthcare Entities
Economies of scale, corporate partnerships and a need to increase the efficiency of Information Technology in the Healthcare sector are leading to the construction of Regional Hea...
Tyrone Grandison, Srivatsava Ranjit Ganta, Uri Bra...
104
Voted
CLUSTER
2004
IEEE
15 years 18 days ago
Performance Evaluation of Shared Mesh Protection in WDM Networks
The efficient use of network capacity in shared restoration schemes strongly depends upon the path selection procedure. In this paper we propose and evaluate path selection algorit...
Chadi Assi, Ahmad Khalil, Nasir Ghani, Abdallah Sh...
131
Voted
INFOCOM
2012
IEEE
13 years 3 months ago
Phantom: Physical layer cooperation for location privacy protection
—Localization techniques that allow inferring the location of wireless devices directly from received signals have exposed mobile users to new threats. Adversaries can easily col...
Sangho Oh, Tam Vu, Marco Gruteser, Suman Banerjee
67
Voted
SIGMOD
2004
ACM
95views Database» more  SIGMOD 2004»
16 years 27 days ago
Logic-based Web Information Extraction
Georg Gottlob, Christoph Koch