Sciweavers

911 search results - page 141 / 183
» The Semantics of Event Prevention
Sort
View
ICDT
2007
ACM
107views Database» more  ICDT 2007»
15 years 4 months ago
Privacy in GLAV Information Integration
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Alan Nash, Alin Deutsch
ISW
2007
Springer
15 years 4 months ago
Towards a DL-Based Additively Homomorphic Encryption Scheme
ElGamal scheme has been the first encryption scheme based on discrete logarithm. One of its main advantage is that it is simple, natural and efficient, but also that its security ...
Guilhem Castagnos, Benoît Chevallier-Mames
71
Voted
ACSAC
2006
IEEE
15 years 4 months ago
Secure Distributed Cluster Formation in Wireless Sensor Networks
In wireless sensor networks, clustering sensor nodes into small groups is an effective technique to achieve scalability, self-organization, power saving, channel access, routing, ...
Kun Sun, Pai Peng, Peng Ning, Cliff Wang
EMSOFT
2005
Springer
15 years 3 months ago
Distributed-code generation from hybrid systems models for time-delayed multirate systems
Hybrid systems are an appropriate formalism to model embedded systems as they capture the theme of continuous dynamics with discrete control. A simple extension, a network of comm...
Madhukar Anand, Sebastian Fischmeister, Jesung Kim...
GPCE
2005
Springer
15 years 3 months ago
Language Requirements for Large-Scale Generic Libraries
Abstract. The past decade of experience has demonstrated that the generic programming methodology is highly effective for the design, implementation, and use of large-scale softwar...
Jeremy G. Siek, Andrew Lumsdaine