Sciweavers

516 search results - page 78 / 104
» Comparing Two Information Flow Security Properties
Sort
View
CCS
2001
ACM
14 years 1 months ago
Interoperable strategies in automated trust negotiation
Automated trust negotiation is an approach to establishing trust between strangers through the exchange of digital credentials and the use of access control policies that specify ...
Ting Yu, Marianne Winslett, Kent E. Seamons
STORAGESS
2006
ACM
14 years 2 months ago
Using free web storage for data backup
Backing up important data is crucial. A variety of causes can lead to data loss, such as disk failures, administration errors, virus infiltration, theft, and physical damage to e...
Avishay Traeger, Nikolai Joukov, Josef Sipek, Erez...
EUROSYS
2009
ACM
14 years 5 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos
BMCBI
2006
116views more  BMCBI 2006»
13 years 8 months ago
Cluster analysis for DNA methylation profiles having a detection threshold
Background: DNA methylation, a molecular feature used to investigate tumor heterogeneity, can be measured on many genomic regions using the MethyLight technology. Due to the combi...
Paul Marjoram, Jing Chang, Peter W. Laird, Kimberl...
SDM
2008
SIAM
176views Data Mining» more  SDM 2008»
13 years 10 months ago
A General Model for Multiple View Unsupervised Learning
Multiple view data, which have multiple representations from different feature spaces or graph spaces, arise in various data mining applications such as information retrieval, bio...
Bo Long, Philip S. Yu, Zhongfei (Mark) Zhang