Privacy Preserving Distributed Machine Learning With Federated Learning | 2 | 0.40 | 2021 |
Efficient privacy preservation of big data for accurate data mining | 2 | 0.36 | 2019 |
Context-Aware Multifaceted Trust Framework For Evaluating Trustworthiness of Cloud Providers. | 6 | 0.39 | 2018 |
Efficient Data Perturbation for Privacy Preserving and Accurate Data Stream Mining. | 2 | 0.37 | 2018 |
Trusting Cloud Service Providers: Trust Phases and a Taxonomy of Trust Factors. | 3 | 0.44 | 2017 |
The mediator authorization-security model for heterogeneous semantic knowledge bases | 1 | 0.37 | 2016 |
Towards an architecture for managing semantic knowledge in semantic repositories | 1 | 0.35 | 2015 |
A solution for privacy-preserving, remote access to sensitive data | 0 | 0.34 | 2014 |
Optimized Energy Management for Mixed Uplink Traffic in LTE UE. | 1 | 0.38 | 2013 |
µ-Fractal Based Data Perturbation Algorithm For Privacy Protection. | 2 | 0.40 | 2012 |
Securing Data Privacy on Mobile Devices in Emergency Health Situations. | 2 | 0.72 | 2012 |
Building Web services middleware with predictable execution times. | 2 | 0.47 | 2012 |
Privacy-Aware Granular Data Access Control For Cross-Domain Data Sharing. | 0 | 0.34 | 2011 |
Pair-Wise Privilege Control for Cross-Domain Private Data Sharing. | 1 | 0.39 | 2010 |
An analytical model of TCP flow in multi-hop wireless networks | 1 | 0.36 | 2010 |
Using Real-Time Scheduling Principles in Web Service Clusters to Achieve Predictability of Service Execution | 2 | 0.42 | 2010 |
Information Flow Control for Cooperation Support in Virtual Enterprises | 1 | 0.37 | 2009 |
A Dynamic Label Checking Approach For Information Flow Control In Web Services | 10 | 0.69 | 2006 |
A benchmark on soap's transport protocols performance for mobile applications | 11 | 0.77 | 2006 |
Optimizing Web Services Performance by Using Similarity-Based Multicast Protocol | 9 | 0.55 | 2006 |
An Analytical Study Of Cache Invalidation Algorithms In Mobile Environments | 1 | 0.38 | 2006 |
Supporting disconnection operations through cooperative hoarding | 1 | 0.35 | 2005 |
Secure Group Communication with Distributed Generation of Private Keys in Ad-hoc Networks | 0 | 0.34 | 2005 |
A Cost Based Coordination Model for Long Running Transactions in Web Services | 0 | 0.34 | 2005 |
Protecting Consumer Data in Composite Web Services | 7 | 0.61 | 2005 |
Wide Area Service Discovery and Adaptation for Mobile Clients in Networks with Ad Hoc Behaviour | 2 | 0.41 | 2005 |
Integration of Heterogeneous Web Service Components | 0 | 0.34 | 2004 |
An analytical study of object relocation strategies for wireless environments | 0 | 0.34 | 2004 |
An Analytical Study of Broadcast Based Cache Invalidation in Mobile Computing Networks | 3 | 0.40 | 2003 |
Intrusion Detection Based on Data Mining | 4 | 0.68 | 2003 |
APLRAC: A Pattern Language for Designing and Implementing Role-Based Access Control. | 0 | 0.34 | 2001 |
Data Access Control in Virtual Organizations - Role-Based Access Control Patterns | 0 | 0.34 | 2001 |
Digital Enterprise Challenges: Life-Cycle Approach to Management and Production, IFIP TC5 / WG5.2 & WG5.3 Eleventh International PROLAMAT Conference on Digital Enterprise - New Challenges, November 7-10, 2001, Budapest, Hungary | 49 | 10.66 | 2001 |
Software Technology for Design System Integration | 1 | 0.43 | 2000 |
Collaboration and Application Integration: Distributed Design with Virtual CAD | 3 | 0.66 | 2000 |
Working Group Report on Information Infrastructure for Global and Virtual Enterprises | 0 | 0.34 | 1997 |
Cooperative Design On The Internet | 2 | 0.68 | 1996 |
Ifip/Ifac International Working Conference On Knowledge-Based Hybrid Systems In Engineering And Manufacturing. | 0 | 0.34 | 1993 |
Knowledge Based Hybrid Systems, Proceedings of the IFIP TC5/WG5.3/IFAC International Working Conference on Knowledge Based Hybrid Systems in Engineering and Manufacturing, KNOWHSEM '93, Budapest, Hungary, 20-22 April, 1993 | 26 | 8.79 | 1993 |