• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 492
Next 10 →

13th IEEE International Symposium on Pacific Rim Dependable Computing Applying a Threshold Scheme to the Pseudonymization of Health Data

by Bernhard Riedl, Veronika Grascher, Thomas Neubauer
"... Due to the cost pressure on the health care system an increase in the need for electronic healthcare records (EHR) could be observed in the last decade because EHRs promise massive savings by digitizing and centrally providing medical data. As highly sensitive patient information is exchanged and st ..."
Abstract - Add to MetaCart
that guarantees data privacy and keeps the access to health data under strict control of the patient. This paper introduces PIPE (Pseudonymization of Information for Privacy in e-Health), a new EHR architecture for primary and secondary usage of health data. PIPE’s security model is based on pseudonymization

SLOW: A Practical Pseudonym Changing Scheme for Location Privacy in VANETs

by Levente Buttyán, Tamás Holczer, André Weimerskirch, William Whyte
"... Abstract—Untraceability of vehicles is an important requirement in future vehicle communications systems. Unfortunately, heartbeat messages used by many safety applications provide a constant stream of location data, and without any protection measures, they make tracking of vehicles easy even for a ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
cooperation between vehicles and any infrastructure support. Our basic idea is that vehicles should not transmit heartbeat messages when their speed drops below a given threshold, say 30 km/h, and they should change pseudonym during each such silent period. This ensures that vehicles stopping at traffic

SCHEMES

by Zhao Ting, Pravesh Debba, Alfred Stein
"... Spatial sampling optimization is an important issue for both geo-chemists and geo-statisticians. Many spatial sampling optimization methods have been previously developed. In this paper, we present a spatial simulated annealing method is presented using hyperspectral data.This sampling method was ap ..."
Abstract - Add to MetaCart
an impact on the quality of drinking water and the health of riparian ecosystems. To assess or monitor environmental impact of mining, sampling of mine waste is required. Optimal geochemical sampling schemes, which focus on ground verification of mine wastes extracted from hyperspectral data, was derived

A Geometric Approach to Monitoring Threshold Functions Over Distributed Data Streams

by Izchak Sharfman, Assaf Schuster, Daniel Keren - In ACM SIGMOD
"... Monitoring data streams in a distributed system is the fo-cus of much research in recent years. Most of the proposed schemes, however, deal with monitoring simple aggregated values, such as the frequency of appearance of items in the streams. More involved challenges, such as the important task of f ..."
Abstract - Cited by 92 (20 self) - Add to MetaCart
Monitoring data streams in a distributed system is the fo-cus of much research in recent years. Most of the proposed schemes, however, deal with monitoring simple aggregated values, such as the frequency of appearance of items in the streams. More involved challenges, such as the important task

Modeling the atmospheric dust cycle: 1. Design of a soil-derived dust emission scheme

by B. Marticorena, G. Bergametti , 1995
"... A soil-derived dust emission scheme has been designed to provide an explicit representation of the desert dust sources for the atmospheric transport models dealing with the simulation of the desert dust cycle. Two major factors characterizing the erodible surface are considered: (1) the size distrib ..."
Abstract - Cited by 119 (2 self) - Add to MetaCart
friction velocity by adapting a size-dependent parameterization proposed by Iversen and White (1982) and by applying to the rough erodible surfaces a drag partition scheme derived from Arya (1975). This parameterization of the threshold friction velocity has been included in an horizontal flux equation

A Novel Threshold Scheme based on Elliptic Curve

by Grey System Theory, Tzer-shyong Chen, Chieh-yen Hsu
"... Based on elliptic curve cryptosystem, this paper proposes a scheme for communication between two groups. The scheme uses the threshold scheme for identity verification between groups, and the digital signature scheme for verification between groups and groups. The generation of group secret key is b ..."
Abstract - Add to MetaCart
Based on elliptic curve cryptosystem, this paper proposes a scheme for communication between two groups. The scheme uses the threshold scheme for identity verification between groups, and the digital signature scheme for verification between groups and groups. The generation of group secret key

An Improved Threshold Ring Signature Scheme Based on Error Correcting Codes

by Pierre-louis Cayrel, Sidi Mohamed, El Yousfi Alaoui, Gerhrad Hoffmann, Pascal Véron
"... Abstract. The concept of threshold ring signature in code-based cryptography was introduced by Aguilar et al. in [1]. Their proposal uses Stern’s identification scheme as basis. In this paper we construct a novel threshold ring signature scheme built on the q-SD identification scheme recently propos ..."
Abstract - Add to MetaCart
Abstract. The concept of threshold ring signature in code-based cryptography was introduced by Aguilar et al. in [1]. Their proposal uses Stern’s identification scheme as basis. In this paper we construct a novel threshold ring signature scheme built on the q-SD identification scheme recently

Indicators for Social and Economic Coping Capacity - Moving Toward a Working Definition of Adaptive Capacity”, Wesleyan-CMU Working Paper.

by Gary Yohe , Richard S J Tol , Gary Yohe , 2001
"... Abstract This paper offers a practically motivated method for evaluating systems' abilities to handle external stress. The method is designed to assess the potential contributions of various adaptation options to improving systems' coping capacities by focusing attention directly on the u ..."
Abstract - Cited by 109 (14 self) - Add to MetaCart
in defining the boundaries of coping ranges -thresholds of relatively benign experience beyond which systems feel significant effects from change and/or variability in their environments. Section 2 uses a more formal representation of vulnerability to show how overall coping capacity might be judged

Determining the Optimum Threshold Values of MCS Levels for Retransmission Packets in HARQ Schemes

by Bang Chul Jung, Jae Kyun Kwon, Dan Keun Sung
"... Abstract – We analyze the optimum threshold value used in determining the modulation and coding scheme (MCS) level of retransmission packets in HARQ schemes. In HARQ schemes, although the first packet is erroneous, it has a considerable energy that can enhance the system performance such as packet e ..."
Abstract - Add to MetaCart
Abstract – We analyze the optimum threshold value used in determining the modulation and coding scheme (MCS) level of retransmission packets in HARQ schemes. In HARQ schemes, although the first packet is erroneous, it has a considerable energy that can enhance the system performance such as packet

Galerkin Schemes for Conservation Laws

by Nune Hovhannisyan, Siegfried Müller, Roland Schäfer , 2010
"... A multiresolution-based adaptation concept is proposed that aims at accelerating Discontinuous Galerkin schemes applied to nonlinear hyperbolic conservation laws. Opposite to standard adaptation concepts no error estimates are needed to tag mesh elements for refinement. Instead of this, a multiresol ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
multiresolution analysis is performed on a hierarchy of nested grids for the data given on a uniformly refined mesh. This provides difference information between successive refinement levels, that may become negligibly small in regions where the solution is locally smooth. Applying hard thresholding the data
Next 10 →
Results 1 - 10 of 492
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University