Sciweavers

433 search results - page 25 / 87
» Administrative and Public Verifiability: Can We Have Both
Sort
View
KDD
2008
ACM
163views Data Mining» more  KDD 2008»
14 years 8 months ago
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Re-identification is a major privacy threat to public datasets containing individual records. Many privacy protection algorithms rely on generalization and suppression of "qu...
Justin Brickell, Vitaly Shmatikov
IJSN
2008
147views more  IJSN 2008»
13 years 7 months ago
Formal modelling and analysis of XML firewall for service-oriented systems
: Firewalls have been designed as a major component to protect a network or a server from being attacked. However, due to their emphasis on packet filtering rather than verifying u...
Haiping Xu, Mihir M. Ayachit, Abhinay Reddyreddy
CCS
2009
ACM
14 years 8 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
BMCBI
2010
124views more  BMCBI 2010»
13 years 7 months ago
Comparative analysis of acute and chronic corticosteroid pharmacogenomic effects in rat liver: Transcriptional dynamics and regu
Background: Comprehensively understanding corticosteroid pharmacogenomic effects is an essential step towards an insight into the underlying molecular mechanisms for both benefici...
Tung T. Nguyen, Richard R. Almon, Debra C. DuBois,...
ICCCN
2008
IEEE
14 years 2 months ago
Fingerprint-Based Location Estimation with Virtual Access Points
— Location fingerprinting techniques generally make use of existing wireless network infrastructure. Consequently, the positions of the access points (APs), which constitute an ...
A. K. M. Mahtab Hossain, Hien Nguyen Van, Wee-Seng...