Sciweavers

52 search results - page 5 / 11
» A public health application of data analysis for homeland se...
Sort
View

Publication
283views
12 years 6 months ago
Security and Surveillance
Human eyes are highly efficient devices for scanning through a large quantity of low-level visual sensory data and delivering selective information to one’s brain for high-level...
Shaogang Gong, Chen Change Loy, Tao Xiang
KDD
2009
ACM
188views Data Mining» more  KDD 2009»
14 years 2 months ago
BGP-lens: patterns and anomalies in internet routing updates
The Border Gateway Protocol (BGP) is one of the fundamental computer communication protocols. Monitoring and mining BGP update messages can directly reveal the health and stabilit...
B. Aditya Prakash, Nicholas Valler, David Andersen...
TDP
2010
140views more  TDP 2010»
13 years 2 months ago
Movement Data Anonymity through Generalization
In recent years, spatio-temporal and moving objects databases have gained considerable interest, due to the diffusion of mobile devices (e.g., mobile phones, RFID devices and GPS ...
Anna Monreale, Gennady L. Andrienko, Natalia V. An...
BMCBI
2006
149views more  BMCBI 2006»
13 years 7 months ago
Curation of viral genomes: challenges, applications and the way forward
Background: Whole genome sequence data is a step towards generating the 'parts list' of life to understand the underlying principles of Biocomplexity. Genome sequencing ...
Urmila Kulkarni-Kale, Shriram Bhosle, G. Sunitha M...
CCS
2010
ACM
13 years 7 months ago
Sidebuster: automated detection and quantification of side-channel leaks in web application development
A web application is a "two-part" program, with its components deployed both in the browser and in the web server. The communication between these two components inevita...
Kehuan Zhang, Zhou Li, Rui Wang 0010, XiaoFeng Wan...