Sciweavers

1640 search results - page 306 / 328
» Conditional Independence Trees
Sort
View
HICSS
2007
IEEE
111views Biometrics» more  HICSS 2007»
14 years 2 months ago
An Empirical Analysis of Fraud Detection in Online Auctions: Credit Card Phantom Transaction
The online auction is a well-known business model that shows how business can be changed with the aid of new technologies. On the other hand, although the online auction allows bu...
Myungsin Chae, Seonyoung Shim, Hyungjun Cho, Byung...
ICC
2007
IEEE
105views Communications» more  ICC 2007»
14 years 2 months ago
An Experimental Study on Cheating and Anti-Cheating in Gossip-Based Protocol
Abstract—The Internet has witnessed a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node independen...
Yun Tang, Nan Zhang, Yuanchun Shi, Shiqiang Yang, ...
INFOCOM
2007
IEEE
14 years 2 months ago
Self-Adaptive On Demand Geographic Routing Protocols for Mobile Ad-hoc Networks
— It has been a big challenge to develop routing protocol that can meet different application needs and optimize routing paths according to the topology change in mobile ad hoc n...
X. Xiang, Z. Zhou, X. Wang
VTC
2007
IEEE
132views Communications» more  VTC 2007»
14 years 2 months ago
Collaborative Information Revelation and Collusion in "Word-of-Mouth" Access Selection Schemes
— “Word-of-Mouth”, a novel scheme for sharing the service quality experienced with different local networks, is presented and evaluated as a distributed solution for performi...
Pietro Lungaro
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
14 years 2 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...