Sciweavers

131 search results - page 18 / 27
» Active Data Protection with Data Journals
Sort
View
DATE
2005
IEEE
136views Hardware» more  DATE 2005»
14 years 1 months ago
Increasing Register File Immunity to Transient Errors
Transient errors are one of the major reasons for system downtime in many systems. While prior research has mainly focused on the impact of transient errors on datapath, caches an...
Gokhan Memik, Mahmut T. Kandemir, Ozcan Ozturk
SIGECOM
2000
ACM
116views ECommerce» more  SIGECOM 2000»
14 years 1 days ago
Privacy-preserving global customization
d Abstract) Robert M. Arlein Ben Jai Markus Jakobsson Fabian Monrose Michael K. Reiter Information Sciences Research Center Bell Labs, Lucent Technologies Murray Hill, NJ, USA We ...
Robert M. Arlein, Ben Jai, Markus Jakobsson, Fabia...
ISI
2006
Springer
13 years 7 months ago
Suspect Vehicle Identification for Border Safety with Modified Mutual Information
The Department of Homeland Security monitors vehicles entering and leaving the country at land ports of entry. Some vehicles are targeted to search for drugs and other contraband. ...
Siddharth Kaza, Yuan Wang, Hsinchun Chen
CSFW
2002
IEEE
14 years 19 days ago
A Privacy Policy Model for Enterprises
Privacy is an increasing concern in the marketplace. Although enterprises promise sound privacy practices to their customers, there is no technical mechanism to enforce them inter...
Günter Karjoth, Matthias Schunter
PERVASIVE
2011
Springer
12 years 10 months ago
n-Gram Geo-trace Modeling
As location-sensing smart phones and location-based services gain mainstream popularity, there is increased interest in developing techniques that can detect anomalous activities. ...
Senaka Buthpitiya, Ying Zhang, Anind K. Dey, Marti...