Sciweavers

1328 search results - page 165 / 266
» Cut-free common knowledge
Sort
View
SIGECOM
2009
ACM
95views ECommerce» more  SIGECOM 2009»
15 years 11 months ago
Eliciting truthful answers to multiple-choice questions
Motivated by the prevalence of online questionnaires in electronic commerce, and of multiple-choice questions in such questionnaires, we consider the problem of eliciting truthful...
Nicolas S. Lambert, Yoav Shoham
ACSAC
2008
IEEE
15 years 11 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
BIBM
2008
IEEE
108views Bioinformatics» more  BIBM 2008»
15 years 11 months ago
Systematic Evaluation of Scaling Methods for Gene Expression Data
Even after an experimentally prepared gene expression data set has been pre-processed to account for variations in the microarray technology, there may be inconsistencies between ...
Gaurav Pandey, Lakshmi Naarayanan Ramakrishnan, Mi...
ICPP
2008
IEEE
15 years 11 months ago
On the Design of Fast Pseudo-Random Number Generators for the Cell Broadband Engine and an Application to Risk Analysis
Numerical simulations in computational physics, biology, and finance, often require the use of high quality and efficient parallel random number generators. We design and optimi...
David A. Bader, Aparna Chandramowlishwaran, Virat ...
IEEEARES
2008
IEEE
15 years 11 months ago
Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols
Existing undecidability proofs of checking secrecy of cryptographic protocols have the limitations of not considering protocols common in literature, which are in the form of comm...
Zhiyao Liang, Rakesh M. Verma