Sciweavers

418 search results - page 74 / 84
» Deriving Systems Level Security Properties of Component Base...
Sort
View
ACMSE
2007
ACM
13 years 11 months ago
Verifying design modularity, hierarchy, and interaction locality using data clustering techniques
Modularity, hierarchy, and interaction locality are general approaches to reducing the complexity of any large system. A widely used principle in achieving these goals in designin...
Liguo Yu, Srini Ramaswamy
BIBM
2007
IEEE
139views Bioinformatics» more  BIBM 2007»
13 years 11 months ago
Automatic Identification of Temporal Sequences in Chewing Sounds
Chewing is an essential part of food intake. The analysis and detection of food patterns is an important component of an automatic dietary monitoring system. However chewing is a t...
Oliver Amft, Martin Kusserow, Gerhard Tröster
SAC
2006
ACM
13 years 7 months ago
Privacy-preserving demographic filtering
The use of recommender systems in e-commerce to guide customer choices presents a privacy protection problem that is twofold. We seek to protect the privacy interests of customers...
Esma Aïmeur, Gilles Brassard, José Man...
SYSTOR
2009
ACM
14 years 2 months ago
DHIS: discriminating hierarchical storage
A typical storage hierarchy comprises of components with varying performance and cost characteristics, providing multiple options for data placement. We propose and evaluate a hie...
Chaitanya Yalamanchili, Kiron Vijayasankar, Erez Z...
AES
2004
Springer
135views Cryptology» more  AES 2004»
14 years 27 days ago
Some Algebraic Aspects of the Advanced Encryption Standard
Abstract. Since being officially selected as the new Advanced Encryption Standard (AES), Rijndael has continued to receive great attention and has had its security continuously eva...
Carlos Cid