Sciweavers

3686 search results - page 80 / 738
» Comprehensive comprehensions
Sort
View
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 6 months ago
A Comprehensive Survey of Data Mining-based Fraud Detection Research
This survey paper categorises, compares, and summarises from almost all published technical and review articles in automated fraud detection within the last 10 years. It defines t...
Clifton Phua, Vincent C. S. Lee, Kate Smith-Miles,...
IJISEC
2010
85views more  IJISEC 2010»
13 years 6 months ago
EXAM: a comprehensive environment for the analysis of access control policies
Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, ...
TCS
2010
13 years 6 months ago
A comprehensive analysis of degree based condition for Hamiltonian cycles
— Rahman and Kaykobad introduced a shortest distance based condition for finding the existence of Hamiltonian paths in graphs as follows: Let G be a connected graph with n vertic...
Md. Kamrul Hasan, Mohammad Kaykobad, Young-Koo Lee...
CASES
2010
ACM
13 years 5 months ago
A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software
The Advanced Encryption Standard is used in almost every new embedded application that needs a symmetric-key cipher. In such embedded applications, high-performance as well as res...
Ambuj Sinha, Zhimin Chen, Patrick Schaumont