Results 1 - 10
of
87,834
V-pada: Vehicle-platoon-aware data access in vanets
- IEEE Transactions on Vehicular Technology
"... Abstract—The high mobility of vehicles and the unreliable wireless communication significantly degrade the performance of data access in vehicular ad hoc networks (VANETs). To address this problem, we propose a novel vehicle-platoon-aware data access solution called V-PADA. In V-PADA, vehicles contr ..."
Abstract
-
Cited by 5 (3 self)
- Add to MetaCart
Abstract—The high mobility of vehicles and the unreliable wireless communication significantly degrade the performance of data access in vehicular ad hoc networks (VANETs). To address this problem, we propose a novel vehicle-platoon-aware data access solution called V-PADA. In V-PADA, vehicles
Enhancement of Vehicular Ad-Hoc Networks Using Vehicle Platoon Aware Data Access
"... Vanets(Vehicular Ad hoc Networks) is used for communicating data between vehicles and with roadside infrastructures. Due to high mobility of vehicles the topology changes dynamically which degrades the performance of data access in VANETs. To overcome this problem, we use Vehicle Platoon Aware Data ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Vanets(Vehicular Ad hoc Networks) is used for communicating data between vehicles and with roadside infrastructures. Due to high mobility of vehicles the topology changes dynamically which degrades the performance of data access in VANETs. To overcome this problem, we use Vehicle Platoon Aware Data
Data Security
, 1979
"... The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and ..."
Abstract
-
Cited by 615 (3 self)
- Add to MetaCart
The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system
Attribute-based encryption for fine-grained access control of encrypted data
- In Proc. of ACMCCS’06
, 2006
"... As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can be selectively shared only at a coarse-grained level (i.e., giving another party your private key). We develop ..."
Abstract
-
Cited by 522 (23 self)
- Add to MetaCart
develop a new cryptosystem for fine-grained sharing of encrypted data that we call Key-Policy Attribute-Based Encryption (KP-ABE). In our cryptosystem, ciphertexts are labeled with sets of attributes and private keys are associated with access structures that control which ciphertexts a user is able
The Protein Data Bank
- Nucleic Acids Res
, 2000
"... The Protein Data Bank (PDB; http://www.rcsb.org/pdb/ ) is the single worldwide archive of structural data of biological macromolecules. This paper describes the goals of the PDB, the systems in place for data deposition and access, how to obtain further information, and near-term plans for the futur ..."
Abstract
-
Cited by 1387 (24 self)
- Add to MetaCart
The Protein Data Bank (PDB; http://www.rcsb.org/pdb/ ) is the single worldwide archive of structural data of biological macromolecules. This paper describes the goals of the PDB, the systems in place for data deposition and access, how to obtain further information, and near-term plans
Privacy-Preserving Data Mining
, 2000
"... A fruitful direction for future data mining research will be the development of techniques that incorporate privacy concerns. Specifically, we address the following question. Since the primary task in data mining is the development of models about aggregated data, can we develop accurate models with ..."
Abstract
-
Cited by 844 (3 self)
- Add to MetaCart
without access to precise information in individual data records? We consider the concrete case of building a decision-tree classifier from tredning data in which the values of individual records have been perturbed. The resulting data records look very different from the original records
Access path selection in a relational database management system
, 1979
"... ABSTRACT: In a high level query and data manipulation language such as SQL, requests are stated non-procedurally, without reference to access paths. This paper describes how System R chooses access paths for both simple (single relation) and complex queries (such as joins), given a user specificatio ..."
Abstract
-
Cited by 587 (1 self)
- Add to MetaCart
ABSTRACT: In a high level query and data manipulation language such as SQL, requests are stated non-procedurally, without reference to access paths. This paper describes how System R chooses access paths for both simple (single relation) and complex queries (such as joins), given a user
Clustering by passing messages between data points
- Science
, 2007
"... Clustering data by identifying a subset of representative examples is important for processing sensory signals and detecting patterns in data. Such “exemplars ” can be found by randomly choosing an initial subset of data points and then iteratively refining it, but this works well only if that initi ..."
Abstract
-
Cited by 696 (8 self)
- Add to MetaCart
. We used affinity propagation to cluster images of faces, detect genes in microarray data, identify representative sentences in this manuscript, and identify cities that are efficiently accessed by airline travel. Affinity propagation found clusters with much lower error than other methods, and it did
MACAW: A Media Access Protocol for Wireless LAN's
"... In recent years, a wide variety of mobile computing devices has emerged, including portables, palmtops, and personal digital assistants. Providing adequate network connectivity for these devices will require a new generation of wireless LAN technology. In this paper we study media access protocols f ..."
Abstract
-
Cited by 839 (11 self)
- Add to MetaCart
for a single channel wireless LAN being developed at Xerox Corporation's Palo Alto Research Center. We start with the MACA media access protocol rst proposed by Karn [9] and later refined by Biba [3] which uses an RTS-CTS-DATA packet exchange and binary exponential backo. Using packet
The R*-tree: an efficient and robust access method for points and rectangles
- INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA
, 1990
"... The R-tree, one of the most popular access methods for rectangles, is based on the heuristic optimization of the area of the enclosing rectangle in each inner node. By running numerous experiments in a standardized testbed under highly varying data, queries and operations, we were able to design the ..."
Abstract
-
Cited by 1262 (74 self)
- Add to MetaCart
The R-tree, one of the most popular access methods for rectangles, is based on the heuristic optimization of the area of the enclosing rectangle in each inner node. By running numerous experiments in a standardized testbed under highly varying data, queries and operations, we were able to design
Results 1 - 10
of
87,834