Sciweavers

3147 search results - page 155 / 630
» Statistically Hiding Sets
Sort
View
CIKM
2005
Springer
15 years 5 months ago
Access control for XML: a dynamic query rewriting approach
We introduce the notion of views as a mechanism for securing and providing access control in the context of XML. Research in XML has explored several efficient querying mechanism...
Sriram Mohan, Arijit Sengupta, Yuqing Wu
DCOSS
2005
Springer
15 years 5 months ago
Macro-programming Wireless Sensor Networks Using Kairos
The literature on programming sensor networks has focused so far on g higher-level abstractions for expressing local node behavior. Kairos is a natural next step in sensor network ...
Ramakrishna Gummadi, Omprakash Gnawali, Ramesh Gov...
HVC
2005
Springer
113views Hardware» more  HVC 2005»
15 years 5 months ago
Choosing Among Alternative Futures
Non-determinism is a serious impediment to testing and debugging concurrent programs. Such programs do not execute the same way each time they are run, which can hide the presence ...
Steve MacDonald, Jun Chen, Diego Novillo
MIDDLEWARE
2005
Springer
15 years 5 months ago
Integrated support for handoff management and context awareness in heterogeneous wireless networks
The overwhelming success of mobile devices and wireless communications is stressing the need for the development of mobility-aware services. Device mobility requires services adap...
Paolo Bellavista, Marcello Cinque, Domenico Cotron...
EUROCRYPT
2004
Springer
15 years 5 months ago
Secure Computation of the k th-Ranked Element
Given two or more parties possessing large, confidential datasets, we consider the problem of securely computing the kth -ranked element of the union of the datasets, e.g. the med...
Gagan Aggarwal, Nina Mishra, Benny Pinkas