Sciweavers

1890 search results - page 285 / 378
» Querying Big Data by Accessing Small Data
Sort
View
ACSAC
2006
IEEE
15 years 5 months ago
PAST: Probabilistic Authentication of Sensor Timestamps
Sensor networks are deployed to monitor the physical environment in public and vulnerable locations. It is not economically viable to house sensors in tamper-resilient enclosures ...
Ashish Gehani, Surendar Chandra
PERVASIVE
2006
Springer
14 years 11 months ago
Secure Mobile Computing Via Public Terminals
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
Richard Sharp, James Scott, Alastair R. Beresford
ICST
2009
IEEE
15 years 5 months ago
An Initial Characterization of Industrial Graphical User Interface Systems
To date we have developed and applied numerous model-based GUI testing techniques; however, we are unable to provide definitive improvement schemes to real-world GUI test planners...
Penelope A. Brooks, Brian P. Robinson, Atif M. Mem...
87
Voted
IJHPCA
2010
84views more  IJHPCA 2010»
14 years 9 months ago
Operation Stacking for Ensemble Computations With Variable Convergence
Sparse matrix operations achieve only small fractions of peak CPU speeds because of the use of specialized, indexbased matrix representations, which degrade cache utilization by i...
Mehmet Belgin, Godmar Back, Calvin J. Ribbens
IACR
2011
110views more  IACR 2011»
13 years 10 months ago
On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme
With the gaining popularity of remote storage (e.g. in the Cloud), we consider the setting where a small, protected local machine wishes to access data on a large, untrusted remot...
Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky