Sciweavers

12183 search results - page 2424 / 2437
» Computers under Attacks!
Sort
View
TKDE
2011
472views more  TKDE 2011»
14 years 10 months ago
Anonymous Publication of Sensitive Transactional Data
Abstract—Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-...
Gabriel Ghinita, Panos Kalnis, Yufei Tao
157
Voted
CORR
2010
Springer
171views Education» more  CORR 2010»
14 years 10 months ago
Online Learning in Opportunistic Spectrum Access: A Restless Bandit Approach
We consider an opportunistic spectrum access (OSA) problem where the time-varying condition of each channel (e.g., as a result of random fading or certain primary users' activ...
Cem Tekin, Mingyan Liu
144
Voted
ECEASST
2010
14 years 10 months ago
Verified Visualisation of Textual Modelling Languages
Abstract. Many modelling languages have both a textual and a graphical form. The relationship between these two forms ought to be clear and concrete, but is instead commonly unders...
Fintan Fairmichael, Joseph Kiniry
WWW
2011
ACM
14 years 10 months ago
Second international workshop on RESTful design (WS-REST 2011)
Over the past few years, the discussion between the two major architectural styles for designing and implementing Web services, the RPC-oriented approach and the resourceoriented ...
Cesare Pautasso, Erik Wilde, Rosa Alarcón
JGS
2010
106views more  JGS 2010»
14 years 10 months ago
On vector autoregressive modeling in space and time
Despite the fact that it provides a potentially useful analytical tool, allowing for the joint modeling of dynamic interdependencies within a group of connected areas, until latel...
Valter Di Giacinto
« Prev « First page 2424 / 2437 Last » Next »