Sciweavers

119 search results - page 4 / 24
» Self Protecting Data for De-perimeterised Information Sharin...
Sort
View
SRDS
2010
IEEE
14 years 7 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
SIGMOD
2007
ACM
161views Database» more  SIGMOD 2007»
15 years 9 months ago
Homeviews: peer-to-peer middleware for personal data sharing applications
This paper presents HomeViews, a peer-to-peer middleware system for building personal data management applications. HomeViews provides abstractions and services for data organizat...
Roxana Geambasu, Magdalena Balazinska, Steven D. G...
EDBT
2008
ACM
144views Database» more  EDBT 2008»
15 years 9 months ago
Protecting privacy in recorded conversations
Professionals in the field of speech technology are often constrained by a lack of speech corpora that are important to their research and development activities. These corpora ex...
Scot Cunningham, Traian Marius Truta
CISS
2008
IEEE
15 years 3 months ago
Overlay protection against link failures using network coding
Abstract—This paper introduces a network coding-based protection scheme against single and multiple link failures. The proposed strategy makes sure that in a connection, each nod...
Ahmed E. Kamal, Aditya Ramamoorthy
WOA
2004
14 years 10 months ago
Customer information sharing between e-commerce applications
The management of one-to-one business interaction is challenged by the latency in the acquisition of information about the individual customer's preferences. Although sharing ...
Barbara Negro, Angelo Difino, Fabio Bellifemine, G...