Sciweavers

200 search results - page 39 / 40
» An Update from VisWeek 2009
Sort
View
ACSAC
2009
IEEE
13 years 11 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
GLOBECOM
2009
IEEE
13 years 11 months ago
Restarting Particle Filters: An Approach to Improve the Performance of Dynamic Indoor Localization
Particle filters have been found to be effective in tracking mobile targets in indoor environments. One frequently encountered problem in these settings occurs when the target'...
Begumhan Turgut, Richard P. Martin
HOST
2009
IEEE
13 years 11 months ago
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage
A PUF or Physical Unclonable Function is a function that is embodied in a physical structure that consists of many random uncontrollable components which originate from process var...
Klaus Kursawe, Ahmad-Reza Sadeghi, Dries Schelleke...
AMW
2009
13 years 8 months ago
Consistent Query Answering in Data Warehouses
Abstract. A Data Warehouse (DW) is a data repository that organizes and physically integrates data from multiple sources under special kinds of schemas. A DW is composed by a set o...
Leopoldo E. Bertossi, Loreto Bravo, Mónica ...
KDD
2009
ACM
210views Data Mining» more  KDD 2009»
14 years 8 months ago
Large-scale behavioral targeting
Behavioral targeting (BT) leverages historical user behavior to select the ads most relevant to users to display. The state-of-the-art of BT derives a linear Poisson regression mo...
Ye Chen, Dmitry Pavlov, John F. Canny