Sciweavers

3686 search results - page 80 / 738
» Comprehensive comprehensions
Sort
View
CORR
2010
Springer
151views Education» more  CORR 2010»
15 years 29 days ago
A Comprehensive Survey of Data Mining-based Fraud Detection Research
This survey paper categorises, compares, and summarises from almost all published technical and review articles in automated fraud detection within the last 10 years. It defines t...
Clifton Phua, Vincent C. S. Lee, Kate Smith-Miles,...
IJISEC
2010
85views more  IJISEC 2010»
15 years 25 days ago
EXAM: a comprehensive environment for the analysis of access control policies
Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, ...
117
Voted
TCS
2010
15 years 22 days ago
A comprehensive analysis of degree based condition for Hamiltonian cycles
— Rahman and Kaykobad introduced a shortest distance based condition for finding the existence of Hamiltonian paths in graphs as follows: Let G be a connected graph with n vertic...
Md. Kamrul Hasan, Mohammad Kaykobad, Young-Koo Lee...
170
Voted
CASES
2010
ACM
15 years 12 days ago
A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software
The Advanced Encryption Standard is used in almost every new embedded application that needs a symmetric-key cipher. In such embedded applications, high-performance as well as res...
Ambuj Sinha, Zhimin Chen, Patrick Schaumont