Sciweavers

97 search results - page 5 / 20
» Beyond Just Data Privacy
Sort
View
DEXAW
2006
IEEE
123views Database» more  DEXAW 2006»
13 years 11 months ago
Privacy, Security and Trust in P2P environments: A Perspective
The Peer-to-Peer (P2P) paradigm of computing has been growing dramatically in popularity over the last decade. Consequently, large amounts of data are being shared among P2P users...
Anirban Mondal, Masaru Kitsuregawa
BMCBI
2006
169views more  BMCBI 2006»
13 years 8 months ago
Beyond microarrays: Finding key transcription factors controlling signal transduction pathways
Background: Massive gene expression changes in different cellular states measured by microarrays, in fact, reflect just an "echo" of real molecular processes in the cell...
Alexander E. Kel, Nico Voss, Ruy Jauregui, Olga V....
TRUST
2010
Springer
14 years 1 months ago
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
Abstract. Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted o...
Mohammad Nauman, Sohail Khan, Xinwen Zhang, Jean-P...
ACSAC
2010
IEEE
13 years 6 months ago
Conficker and beyond: a large-scale empirical study
Conficker [26] is the most recent widespread, well-known worm/bot. According to several reports [16, 28], it has infected about 7 million to 15 million hosts and the victims are s...
Seungwon Shin, Guofei Gu
ICONFERENCE
2011
13 years 2 months ago
Beyond promotion and protection: creators, audiences and common ground in user-generated media
In this paper, we present findings from a qualitative study of producers in a specific creative domain—online digital photography. We used social psychology and linguistic conce...
Eric C. Cook, Stephanie D. Teasley