Sciweavers

231 search results - page 10 / 47
» A Brief Overview of HOL4
Sort
View
JCS
2011
87views more  JCS 2011»
13 years 3 months ago
Practical eavesdropping and skimming attacks on high-frequency RFID tokens
RFID systems often use near-field magnetic coupling to implement communication channels. The advertised operational range of these channels is less than 10 cm and therefore sever...
Gerhard P. Hancke
SIGKDD
2010
125views more  SIGKDD 2010»
13 years 3 months ago
A framework for mining interesting pattern sets
This paper suggests a framework for mining subjectively interesting pattern sets that is based on two components: (1) the encoding of prior information in a model for the data min...
Tijl De Bie, Kleanthis-Nikolaos Kontonasios, Eirin...
CHI
2011
ACM
13 years 7 days ago
Review spotlight: a user interface for summarizing user-generated reviews using adjective-noun word pairs
Many people read online reviews written by other users to learn more about a product or venue. However, the overwhelming amount of user-generated reviews and variance in length, d...
Koji Yatani, Michael Novati, Andrew Trusty, Khai N...
PERVASIVE
2011
Springer
12 years 11 months ago
Disaggregated End-Use Energy Sensing for the Smart Grid
Most utility installed energy meters are primarily intended to support a utility's billing function. They report only the aggregate energy consumption of a home or business o...
Jon Froehlich, Eric Larson, Sidhant Gupta, Gabe Co...
SIGMOD
2004
ACM
101views Database» more  SIGMOD 2004»
14 years 8 months ago
State-of-the-art in privacy preserving data mining
We provide here an overview of the new and rapidly emerging research area of privacy preserving data mining. We also propose a classification hierarchy that sets the basis for ana...
Vassilios S. Verykios, Elisa Bertino, Igor Nai Fov...