Sciweavers

1328 search results - page 165 / 266
» Common Knowledge
Sort
View
SIGECOM
2009
ACM
95views ECommerce» more  SIGECOM 2009»
14 years 3 months ago
Eliciting truthful answers to multiple-choice questions
Motivated by the prevalence of online questionnaires in electronic commerce, and of multiple-choice questions in such questionnaires, we consider the problem of eliciting truthful...
Nicolas S. Lambert, Yoav Shoham
ACSAC
2008
IEEE
14 years 3 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
BIBM
2008
IEEE
108views Bioinformatics» more  BIBM 2008»
14 years 3 months ago
Systematic Evaluation of Scaling Methods for Gene Expression Data
Even after an experimentally prepared gene expression data set has been pre-processed to account for variations in the microarray technology, there may be inconsistencies between ...
Gaurav Pandey, Lakshmi Naarayanan Ramakrishnan, Mi...
IEEEARES
2008
IEEE
14 years 3 months ago
Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols
Existing undecidability proofs of checking secrecy of cryptographic protocols have the limitations of not considering protocols common in literature, which are in the form of comm...
Zhiyao Liang, Rakesh M. Verma
RTAS
2008
IEEE
14 years 3 months ago
A Modular Worst-case Execution Time Analysis Tool for Java Processors
Recent technologies such as the Real-Time Specification for Java promise to bring Java’s advantages to real-time systems. While these technologies have made Java more predictab...
Trevor Harmon, Martin Schoeberl, Raimund Kirner, R...