Sciweavers

1092 search results - page 174 / 219
» Supporting human memory in personal information management
Sort
View
ACSC
2009
IEEE
15 years 4 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank
MSWIM
2005
ACM
15 years 3 months ago
Balancing auditability and privacy in vehicular networks
We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANET...
Jong Youl Choi, Markus Jakobsson, Susanne Wetzel
BCS
2008
14 years 11 months ago
Provenance-Based Auditing of Private Data Use
Across the world, organizations are required to comply with regulatory frameworks dictating how to manage personal information. Despite these, several cases of data leaks and expo...
Rocío Aldeco-Pérez, Luc Moreau
AVI
2000
14 years 11 months ago
An Architecture for Pen-based Interaction on Electronic Whiteboards
This paper describes the software architecture for our pen-based electronic whiteboard system, called Flatland. The design goal of Flatland is to support various activities on per...
Takeo Igarashi, W. Keith Edwards, Anthony LaMarca,...
COMAD
2009
14 years 11 months ago
Consistency of Databases on Commodity Disk Drives
Most database systems use ARIES-like logging and recovery scheme to recover from failures and guarantee transactional consistency. ARIES relies on the Write-Ahead Logging (WAL) pr...
Robin Dhamankar, Hanuma Kodavalla, Vishal Kathuria