Oxford Index Search Results

You are looking at 21-40 of 56 items for:

sensitive x Computer Science x clear all

Show only full text

Refine by type

Refine by product

 

Recognizing Algorithms Using Language Constructs, Software Metrics and Roles of Variables: An Experiment with Sorting Algorithms

Ahmad Taherkhani, Ari Korhonen and Lauri Malmi.

in The Computer Journal

July 2011; p ublished online May 2010 .

Journal Article. Subjects: Computer Science. 0 words.

Program comprehension (PC) is a research field that has been extensively studied from different points of view, including human program understanding and mental models,...

Go to Oxford Journals »  full text   » abstract

Achieving Key Privacy and Invisibility for Unattended Wireless Sensor Networks in Healthcare

Faezeh Sadat Babamir and Ali Norouzi.

in The Computer Journal

April 2014; p ublished online May 2013 .

Journal Article. Subjects: Computer Science. 0 words.

In this study, we propose an efficient aggregate signcryption scheme to maximize the security of data in a kind of wireless medical network named the disconnected or unattended wireless...

Go to Oxford Journals »  full text   » abstract

Content-Based Image Retrieval of Axial Brain Slices Using a Novel LBP with a Ternary Encoding

Abraham Varghese, Kannan Balakrishnan, Reji Rajan Varghese and Joseph S. Paul.

in The Computer Journal

September 2014; p ublished online February 2014 .

Journal Article. Subjects: Computer Science. 0 words.

Retrieval of similar anatomical structures of brain MR images across patients would help the expert in diagnosis of diseases. In this paper, modified local binary pattern with ternary...

Go to Oxford Journals »  full text

Multilevel Analysis to Detect Covert Social Botnet in Multimedia Social Networks

V. Natarajan, Shina Sheen and R. Anitha.

in The Computer Journal

April 2015; p ublished online July 2014 .

Journal Article. Subjects: Computer Science. 0 words.

In recent years, social botnets have become a major security threat to both online social networking websites and their users. Social bots communicate over probabilistically unobservable...

Go to Oxford Journals »  full text

Trusted Validation for Geolocation of Cloud Data

Dong Lai Fu, Xin Guang Peng and Yu Li Yang.

in The Computer Journal

October 2015; p ublished online December 2014 .

Journal Article. Subjects: Computer Science. 0 words.

It is certain that cloud users are eager to ascertain where their sensitive data are stored. Misplacing the data probably divulges secret information. Therefore, researchers have designed...

Go to Oxford Journals »  full text

Efficiently Monitoring Reverse k-Nearest Neighbors in Spatial Networks

Shenlu Wang, Muhammad Aamir Cheema and Xuemin Lin.

in The Computer Journal

January 2015; p ublished online October 2013 .

Journal Article. Subjects: Computer Science. 0 words.

Given a set of clients C, a set of facilities F and a query qF, a reverse k-nearest neighbor (RkNN) query retrieves every client cC for which q is one of the k closest facilities. In the...

Go to Oxford Journals »  full text

CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks

Hui Lin, Jia Hu, Jianfeng Ma, Li Xu and Li Yang.

in The Computer Journal

April 2015; p ublished online August 2014 .

Journal Article. Subjects: Computer Science. 0 words.

Multi-hop wireless networks (MWNs) have been widely accepted as an indispensable component of next-generation communication systems due to their broad applications and easy deployment...

Go to Oxford Journals »  full text

Evolution-Based Scheduling of Computations and Communications on Distributed-Memory Multicomputers

Mayez Al-Mouhamed.

in The Computer Journal

January 1999; p ublished online January 1999 .

Journal Article. Subjects: Computer Science. 0 words.

We present a compiler optimization approach that uses the simulated evolution (SE) paradigm to enhance the finish time of heuristically scheduled computations with communications. This is...

Go to Oxford Journals »  full text   » abstract

Near Optimal β Heap

R. W. P. Luk.

in The Computer Journal

January 1999; p ublished online January 1999 .

Journal Article. Subjects: Computer Science. 0 words.

A β heap, after D. B. Johnson, corresponds to an M-ary tree with a branch factor β where every vertex of the tree satisfies the heap property. The β heap was also known as the generalized...

Go to Oxford Journals »  full text   » abstract

Real-Time Identification Using Gait Pattern Analysis on a Standalone Wearable Accelerometer

Guglielmo Cola, Marco Avvenuti and Alessio Vecchio.

in The Computer Journal

August 2017; p ublished online January 2017 .

Journal Article. Subjects: Computer Science. 9304 words.

Abstract

Wearable devices can gather sensitive information about their users. For this reason, automated authentication and identification techniques are...

Go to Oxford Journals »  full text

Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage

Yi Dou, Henry C B Chan and Man Ho Au.

Edited by Yi Mu.

in The Computer Journal

December 2018; p ublished online August 2018 .

Journal Article. Subjects: Computer Science. 15466 words.

Abstract

For cloud data storage, data privacy and security are two key concerns. Although sensitive data can be encrypted before they are stored in the cloud,...

Go to Oxford Journals »  full text

Enhancing an Embedded Processor Core for Efficient and Isolated Execution of Cryptographic Algorithms

Kazim Yumbul and Erkay Savaş.

in The Computer Journal

October 2015; p ublished online May 2014 .

Journal Article. Subjects: Computer Science. 0 words.

We propose enhancing a reconfigurable and extensible embedded reduced instruction set computer (RISC) processor core with a protected zone for isolated execution of cryptographic...

Go to Oxford Journals »  full text

Building Footprint Simplification Techniques and Their Effects on Radio Propagation Predictions

Zhongqiang Chen, Alex Delis and Henry L. Bertoni.

in The Computer Journal

January 2004; p ublished online January 2004 .

Journal Article. Subjects: Computer Science. 0 words.

Building footprint simplification is of critical importance to radio propagation predictions in wireless communication systems as the prediction time is closely related to the number of both...

Go to Oxford Journals »  full text   » abstract

A Single-Item Measure of Website Usability: Comments on Christophersen and Konradt (2011)

Jeff Sauro.

in Interacting with Computers

July 2013; p ublished online March 2013 .

Journal Article. Subjects: Human-Computer Interaction. 622 words.

Christophersen and Konradt show that a single-item measure of usability can retain most of the information garnered in multi-item scale. While there is some loss of information and...

Go to Oxford Journals »  abstract

A Unifying Reference Framework for multi-target user interfaces

Gaëlle Calvary, Joëlle Coutaz, David Thevenin, Quentin Limbourg, Laurent Bouillon and Jean Vanderdonckt.

in Interacting with Computers

June 2003; p ublished online June 2003 .

Journal Article. Subjects: Human-Computer Interaction. 6932 words.

This paper describes a framework that serves as a reference for classifying user interfaces supporting multiple targets, or multiple contexts of use in the field of context-aware computing....

Go to Oxford Journals »  abstract

Tools over solutions? comments on Interacting with Computers special issue on affective computing

Noam Tractinsky.

in Interacting with Computers

August 2004; p ublished online July 2004 .

Journal Article. Subjects: Human-Computer Interaction. 3289 words.

The emotional system is highly sensitive to individual, cultural and contextual differences. This creates difficulties in studying and designing affect in HCI. It is hard to see how grand...

Go to Oxford Journals »  abstract

Private whispers/public eyes: Is receiving highly personal information in a public place stressful?

Linda Little and Pam Briggs.

in Interacting with Computers

August 2009; p ublished online June 2009 .

Journal Article. Subjects: Human-Computer Interaction. 5499 words.

Abstract

The use of technology to access personal information in public places is increasingly common, but can these interactions induce stress? Sixty-eight...

Go to Oxford Journals »  abstract

Using and managing multiple passwords: A week to a view

Beate Grawemeyer and Hilary Johnson.

in Interacting with Computers

May 2011; p ublished online April 2011 .

Journal Article. Subjects: Human-Computer Interaction. 11769 words.

Abstract

Security policies are required that protect information from unauthorised access, and also respect challenges users face in creating, and...

Go to Oxford Journals »  abstract

Mobile agents for mobile tourists: a user evaluation of Gulliver’s Genie

M.J. O’Grady, G.M.P. O’Hare and C. Sas.

in Interacting with Computers

July 2005; p ublished online February 2005 .

Journal Article. Subjects: Human-Computer Interaction. 8520 words.

How mobile computing applications and services may be best designed, implemented and deployed remains the subject of much research. One alternative approach to developing software for...

Go to Oxford Journals »  abstract

Collaborative use of individual search histories

Anita Komlodi and Wayne G. Lutters.

in Interacting with Computers

January 2008; p ublished online November 2007 .

Journal Article. Subjects: Human-Computer Interaction. 11432 words.

Abstract

Interaction history tools record interactions between users and systems, allowing users to annotate, edit, and replay their activities. Search...

Go to Oxford Journals »  abstract