Sciweavers

2403 search results - page 311 / 481
» Cyberinsurance in IT Security Management
Sort
View
CCS
2011
ACM
12 years 8 months ago
Televisions, video privacy, and powerline electromagnetic interference
We conduct an extensive study of information leakage over the powerline infrastructure from eight televisions (TVs) spanning multiple makes, models, and underlying technologies. I...
Miro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak...

Lecture Notes
773views
15 years 6 months ago
Computer Networking and Internet Protocols: A Comprehensive Introduction
The lecture notes cover the following topics, Fundamentals (OSI Reference Model, Coding, Ethernet), Data Link Control (Flow Control, Error Control, HDLC, PPP), Internet Protocol ...
Raj Jain
KDD
2003
ACM
113views Data Mining» more  KDD 2003»
14 years 8 months ago
Using randomized response techniques for privacy-preserving data mining
Privacy is an important issue in data mining and knowledge discovery. In this paper, we propose to use the randomized response techniques to conduct the data mining computation. S...
Wenliang Du, Zhijun Zhan
PERCOM
2007
ACM
14 years 8 months ago
Challenges for Pervasive RFID-Based Infrastructures
The success of RFID in supply chain management is leading many to consider more personal and pervasive deployments of this technology. Unlike industrial settings, however, deploym...
Evan Welbourne, Magdalena Balazinska, Gaetano Borr...
PERCOM
2004
ACM
14 years 8 months ago
On Negotiating Automatic Device Configuration in Smart Environments
As the number of mobile devices we carry grows, the job of managing those devices throughout the day becomes cumbersome. In addition, the ability to use mobile devices in unethica...
Kay Connelly, Ashraf Khalil