Sciweavers

2486 search results - page 455 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
JCDL
2004
ACM
146views Education» more  JCDL 2004»
14 years 2 months ago
Enhancing digital libraries with TechLens+
The number of research papers available is growing at a staggering rate. Researchers need tools to help them find the papers they should read among all the papers published each y...
Roberto Torres, Sean M. McNee, Mara Abel, Joseph A...
NDSS
2008
IEEE
14 years 3 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
24
Voted
BILDMED
2009
128views Algorithms» more  BILDMED 2009»
13 years 9 months ago
Surface-Based Respiratory Motion Classification and Verification
To ensure precise tumor irradiation in radiotherapy a stable breathing pattern is mandatory as tumors are moving due to respiratory motion. Consequentially, irregularities of respi...
Kerstin Müller, Christian Schaller, Jochen Pe...
MM
2006
ACM
157views Multimedia» more  MM 2006»
14 years 2 months ago
Cyborglogging with camera phones: steps toward equiveillance
We present “equiveillance” as a conceptual framework for understanding the balance between surveillance and sousveillance. In addition to this conceptual framework we also pre...
Steve Mann, James Fung, Raymond Lo
SIGMOD
2008
ACM
164views Database» more  SIGMOD 2008»
14 years 8 months ago
Finding frequent items in probabilistic data
Computing statistical information on probabilistic data has attracted a lot of attention recently, as the data generated from a wide range of data sources are inherently fuzzy or ...
Qin Zhang, Feifei Li, Ke Yi