Oxford Index Search Results

You are looking at 1-20 of 56 items for:

sensitive x Computer Science x clear all

Show only full text

Refine by type

Refine by product

 

sensitive

Overview page. Subjects: Medicine and Health.

adj. possessing the ability to respond to a stimulus. The cells of the retina, for example, are sensitive to the stimulus of light and respond by sending nerve impulses to the...

See overview in Oxford Index

Cache-Sensitive Memory Layout for Dynamic Binary Trees

Riku Saikkonen and Eljas Soisalon-Soininen.

in The Computer Journal

May 2016; p ublished online May 2016 .

Journal Article. Subjects: Computer Science. 14266 words.

We use cache-sensitive memory layouts to improve search performance in ordinary binary search trees, without increasing the time complexity of insertion or deletion. Our approach does not...

Go to Oxford Journals »  full text

A Context-sensitive Graph Grammar Formalism for the Specification of Visual Languages

Da-Qian Zhang, Kang Zhang and Jiannong Cao.

in The Computer Journal

January 2001; p ublished online January 2001 .

Journal Article. Subjects: Computer Science. 0 words.

Graph grammars may be used as natural and powerful syntax-definition formalisms for visual programming languages. Yet most graph-grammar parsing algorithms presented so far are either unable...

Go to Oxford Journals »  full text   » abstract

QPRR: QoS-Aware Peering Routing Protocol for Reliability Sensitive Data in Body Area Network Communication

Zahoor A. Khan, Shyamala C. Sivakumar, William J. Phillips and Bill Robertson.

in The Computer Journal

August 2015; p ublished online November 2014 .

Journal Article. Subjects: Computer Science. 0 words.

The reliability, energy efficiency and real-time display of patient's data are important factors for body area network (BAN) communication in indoor hospital environments. In this paper, we...

Go to Oxford Journals »  full text   » abstract

Extending Value Sensitive Design to Off-the-Shelf Technology: Lessons Learned from a Local Intercultural Computer Club

Anne Weibert, Dave Randall and Volker Wulf.

in Interacting with Computers

September 2017; p ublished online May 2017 .

Journal Article. Subjects: Human-Computer Interaction. 17069 words.

Abstract

Studying the setup and development of an initiative of computer clubs in intercultural neighborhoods, this paper builds on the theory and method...

Go to Oxford Journals »  home page

Border sensitive centrality in global patent citation networks

Greg Morrison, Eleftherios Giovanis, Fabio Pammolli and Massimo Riccaboni.

in Journal of Complex Networks

December 2014; p ublished online August 2014 .

Journal Article. Subjects: Mathematics; Computer Science. 8779 words.

When resources are shared between interacting networks, the importance of each node depends strongly on how collaborative or competitive each sub-network is. In this paper, we develop a new...

Go to Oxford Journals »  home page

From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data

Qiang Tang.

in The Computer Journal

April 2015; p ublished online May 2014 .

Journal Article. Subjects: Computer Science. 0 words.

The concept of Ephemerizer, proposed by Perlman, is a cryptographic primitive for assured data deletion. With an Ephemerizer protocol, data in persistent storage devices will always be...

Go to Oxford Journals »  full text

A Survey on the Development of Security Mechanisms for Body Area Networks

Duygu Karaoğlan and Albert Levі.

in The Computer Journal

October 2014; p ublished online August 2013 .

Journal Article. Subjects: Computer Science. 0 words.

Advances in lightweight, small-sized and low-power sensors led to the development of wearable biosensors, and thus, to the accurate monitoring of human periphery. On top of this, pervasive...

Go to Oxford Journals »  full text   » abstract

Adaptation of Near-Perfect Packet-Level FEC Interleaving in Mobile Media Streaming

Sheau-Ru Tong and Yuan-Tse Yu.

in The Computer Journal

November 2014; p ublished online September 2013 .

Journal Article. Subjects: Computer Science. 0 words.

The error-recovery efficiency of packet-level forward-error-correction (PFEC) coding is sensitive to the loss-burst nature of mobile channels. Interleaving, which rearranges the packet...

Go to Oxford Journals »  full text   » abstract

TouchRoller: A Touch-sensitive Cylindrical Input Device for GUI Manipulation of Interactive TVs

Jonggi Hong, Hwan Kim, Woohun Lee and Geehyuk Lee.

in Interacting with Computers

May 2016; p ublished online March 2015 .

Journal Article. Subjects: Human-Computer Interaction. 11172 words.

The two main tasks of a smart TV GUI are menu navigation and free pointing. Traditional remotes with directional keys are suitable for menu navigation but may not be so for free pointing....

Go to Oxford Journals »  home page

Protecting Users against Phishing Attacks

Engin Kirda and Christopher Kruegel.

in The Computer Journal

P ublished online January 2006 .

Journal Article. Subjects: Computer Science. 4012 words.

Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have been...

Go to Oxford Journals »  full text   » abstract

Red-Blue Intersection Reporting for Objects of Non-Constant Size

P. Bozanis, N. Kitsios, C. Makris and A. Tsakalidis.

in The Computer Journal

January 1996; p ublished online January 1996 .

Journal Article. Subjects: Computer Science. 0 words.

Let Q 1 be a set of ‘red’ geometric objects and Q 2 a set of ‘blue’ ones. The objects in Q 1 and Q 2 are of arbitrarily large description size...

Go to Oxford Journals »  full text   » abstract

Privacy-Preserving Data Publication with Features of Independent ℓ-Diversity

Hong Zhu, Shengli Tian and Kevin Lü.

in The Computer Journal

April 2015; p ublished online October 2014 .

Journal Article. Subjects: Computer Science. 0 words.

Datasets containing individuals’ information (stored in back-end databases) are often published and shared in social networks. The disclosure of sensitive individuals’ information in social...

Go to Oxford Journals »  full text

Satisfying Privacy Requirements Before Data Anonymization

Xiaoxun Sun, Hua Wang, Jiuyong Li and Yanchun Zhang.

in The Computer Journal

April 2012; p ublished online April 2012 .

Journal Article. Subjects: Computer Science. 0 words.

In this paper, we study a problem of protecting privacy of individuals in large public survey rating data. We propose a novel (k,ϵ, l)-anonymity model to protect privacy in large survey...

Go to Oxford Journals »  full text   » abstract

DOcyclical: A Latency-Resistant Cyclic Multi-Threading Approach for Automatic Program Parallelization

Hairong Yu, Guohui Li, Jianjun Li and Lihchyun Shu.

in The Computer Journal

August 2016; p ublished online August 2016 .

Journal Article. Subjects: Computer Science. 10519 words.

Chip multiprocessors have been proposed for many years and have become the prevalent architecture for high-performance general-purpose processors. Currently, the search for automatic...

Go to Oxford Journals »  full text

Designing the Game Interface

Kristine Jørgensen.

in Gameworld Interfaces

December 2013; p ublished online May 2014 .

Chapter. Subjects: Computer Science. 14288 words.

This chapter discusses game interface design with point of departure in interaction design. It draws upon the insights of experienced game interface designers, and questions the idea that...

Go to The MIT Press »  abstract

Results on Embeddings Between State-Based and Event-Based Systems

Michel A. Reniers, Rob Schoren and Tim A.C. Willemse.

in The Computer Journal

January 2014; p ublished online December 2012 .

Journal Article. Subjects: Computer Science. 0 words.

Kripke Structures (KSs) and Labelled Transition Systems (LTSs) are the two most prominent semantic models used in concurrency theory. Both models are commonly believed to be...

Go to Oxford Journals »  full text   » abstract

Compression and approximate matching

L Allison, D. Powell and TI Dix.

in The Computer Journal

January 1999; p ublished online January 1999 .

Journal Article. Subjects: Computer Science. 0 words.

A population of sequences is called non-random if there is a statistical model and an associated compression algorithm that allows members of the population to be compressed, on average. Any...

Go to Oxford Journals »  full text   » abstract

A Rule-Based Fuzzy Inference System for Adaptive Image Contrast Enhancement

Iyad F. Jafar, Khalid A. Darabkh and Ghazi M. Al-Sukkar.

in The Computer Journal

September 2012; p ublished online December 2011 .

Journal Article. Subjects: Computer Science. 0 words.

Adaptive contrast enhancement (ACE) is a popular method for image contrast enhancement. In this method, enhancement is achieved by adding an amplified version of the high-frequency content...

Go to Oxford Journals »  full text   » abstract

Combined-Semantics Equivalence and Minimization of Conjunctive Queries

Rada Chirkova.

in The Computer Journal

May 2014; p ublished online April 2013 .

Journal Article. Subjects: Computer Science. 0 words.

The problems of query containment, equivalence and minimization are fundamental problems in the context of query processing and optimization. In their classic work published in 1977...

Go to Oxford Journals »  full text   » abstract

TLS: A Tabu Search Based Scheduling Algorithm for Behavioral Synthesis of Functional Pipelines

Imtiaz Ahmad, Muhammad K. Dhodhi and Faridah M. Ali.

in The Computer Journal

January 2000; p ublished online January 2000 .

Journal Article. Subjects: Computer Science. 0 words.

This paper presents a resource-constrained scheduling algorithm based on tabu search for high-level behavioral synthesis of functional pipelines. The proposed algorithm, designated as TLS,...

Go to Oxford Journals »  full text   » abstract