Sciweavers

797 search results - page 59 / 160
» Towards a Generalized Interaction Scheme for Information Acc...
Sort
View
SAC
2009
ACM
15 years 4 months ago
Towards developing a trust-based security solution
Wireless sensor network has emerged as a new information and data gathering paradigm based on the collaborative efforts of a large number of autonomous sensing devices. With small...
Sheikh Iqbal Ahamed, Donghyun Kim, Chowdhury Shari...
DRM
2006
Springer
15 years 3 months ago
Towards a secure and interoperable DRM architecture
In this paper we look at the problem of interoperability of digital rights management (DRM) systems in home networks. We introduce an intermediate module called the Domain Interop...
Gelareh Taban, Alvaro A. Cárdenas, Virgil D...
WWW
2007
ACM
16 years 16 days ago
Extending WebML towards semantic web
Available methodologies for developing Sematic Web applications do not fully exploit the whole potential deriving from interaction with ontological data sources. Here we introduce...
Federico Michele Facca, Marco Brambilla
SIGMOD
2010
ACM
308views Database» more  SIGMOD 2010»
14 years 10 months ago
GBLENDER: towards blending visual query formulation and query processing in graph databases
Given a graph database D and a query graph g, an exact subgraph matching query asks for the set S of graphs in D that contain g as a subgraph. This type of queries find important...
Changjiu Jin, Sourav S. Bhowmick, Xiaokui Xiao, Ja...
STOC
2000
ACM
137views Algorithms» more  STOC 2000»
15 years 3 months ago
On the complexity of verifiable secret sharing and multiparty computation
We first study the problem of doing Verifiable Secret Sharing (VSS) information theoretically secure for a general access structure. We do it in the model where private channels b...
Ronald Cramer, Ivan Damgård, Stefan Dziembow...