Sciweavers

1591 search results - page 314 / 319
» Associating network flows with user and application informat...
Sort
View
CCS
2004
ACM
14 years 3 days ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
SIGCOMM
1998
ACM
13 years 11 months ago
Secure Group Communications Using Key Graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group ...
Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam
KDD
2009
ACM
159views Data Mining» more  KDD 2009»
14 years 7 months ago
Mining brain region connectivity for alzheimer's disease study via sparse inverse covariance estimation
Effective diagnosis of Alzheimer's disease (AD), the most common type of dementia in elderly patients, is of primary importance in biomedical research. Recent studies have de...
Liang Sun, Rinkal Patel, Jun Liu, Kewei Chen, Tere...
MUM
2005
ACM
164views Multimedia» more  MUM 2005»
14 years 8 days ago
PhoneGuide: museum guidance supported by on-device object recognition on mobile phones
We present PhoneGuide – an enhanced museum guidance approach that uses camera-equipped mobile phones and on-device object recognition. Our main technical achievement is a simple...
Paul Föckler, Thomas Zeidler, Benjamin Bromba...
SIGMOD
2010
ACM
255views Database» more  SIGMOD 2010»
13 years 11 months ago
Large graph processing in the cloud
As the study of graphs, such as web and social graphs, becomes increasingly popular, the requirements of efficiency and programming flexibility of large graph processing tasks c...
Rishan Chen, Xuetian Weng, Bingsheng He, Mao Yang