Traditional searching and browsing functions for bibliographic databases do no longer enable users to deal efficiently with the rapidly growing number of scientific publications....
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Once a new gene has been sequenced, it must be verified whether or not it is similar to previously sequenced genes. In many cases, the organization that sequenced a potentially n...
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...
Many software acquisition projects are doomed to fail due to a lack of integration of acquisition and development processes on the one hand and, because of shortcomings of classic...
Werner Aigner, Peter Regner, Thomas Wiesinger, Jos...