Sciweavers

17983 search results - page 3442 / 3597
» Set Types and Applications
Sort
View
147
Voted
OTM
2007
Springer
15 years 10 months ago
Managing Pervasive Environment Privacy Using the "fair trade" Metaphor
Abstract. This article presents a proposal for managing privacy in pervasive environments. These environments are capable of sensing personal information anywhere and at anytime. T...
Abraham Esquivel, Pablo A. Haya, Manuel Garc&iacut...
138
Voted
PAM
2007
Springer
15 years 10 months ago
Packet Capture in 10-Gigabit Ethernet Environments Using Contemporary Commodity Hardware
Abstract. Tracing traffic using commodity hardware in contemporary highspeed access or aggregation networks such as 10-Gigabit Ethernet is an increasingly common yet challenging t...
Fabian Schneider, Jörg Wallerich, Anja Feldma...
PKC
2007
Springer
124views Cryptology» more  PKC 2007»
15 years 10 months ago
Practical and Secure Solutions for Integer Comparison
Abstract. Yao’s classical millionaires’ problem is about securely determining whether x > y, given two input values x, y, which are held as private inputs by two parties, re...
Juan A. Garay, Berry Schoenmakers, José Vil...
142
Voted
SEMWEB
2007
Springer
15 years 10 months ago
TaxoMap in the OAEI 2007 Alignment Contest
This paper presents our first participation in the OAEI 2007 campaign. It describes an approach to align taxonomies which relies on terminological and structural techniques applie...
Haïfa Zargayouna, Brigitte Safar, Chantal Rey...
132
Voted
STACS
2007
Springer
15 years 10 months ago
A Deterministic Algorithm for Summarizing Asynchronous Streams over a Sliding Window
We consider the problem of maintaining aggregates over recent elements of a massive data stream. Motivated by applications involving network data, we consider asynchronous data str...
Costas Busch, Srikanta Tirthapura
« Prev « First page 3442 / 3597 Last » Next »