Sciweavers

1917 search results - page 64 / 384
» User Model and Utility Based Power Management
Sort
View
ISW
2009
Springer
15 years 4 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
ICC
2009
IEEE
132views Communications» more  ICC 2009»
15 years 4 months ago
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
P2P
2007
IEEE
156views Communications» more  P2P 2007»
15 years 4 months ago
Completeness Estimation of Range Queries in Structured Overlays
Range queries are a very powerful tool in a wide range of data management systems and are vital to a multitude of applications. The hierarchy of structured overlay systems can be ...
Marcel Karnstedt, Kai-Uwe Sattler, Roman Schmidt
IM
2007
14 years 11 months ago
Automated Availability Management Driven by Business Policies
—Policy-driven service management helps reduce IT management cost and it keeps the service management aligned with business objectives. While most of the previous research focuse...
Zhongtang Cai, Yuan Chen, Vibhore Kumar, Dejan S. ...
GIS
2004
ACM
15 years 11 months ago
Capturing complex multidimensional data in location-based data warehouses
Motivated by the increasing need to handle complex multidimensional data in location-based data warehouses, this paper proposes a powerful data model that is able to capture the c...
Igor Timko, Torben Bach Pedersen