Sciweavers

420 search results - page 67 / 84
» Discovering Conditional Functional Dependencies
Sort
View
CSFW
2008
IEEE
14 years 4 months ago
Security Decision-Making among Interdependent Organizations
In various settings, such as when customers use the same passwords at several independent web sites, security decisions by one organization may have a significant impact on the s...
Reiko Ann Miura-Ko, Benjamin Yolken, John Mitchell...
HOST
2008
IEEE
14 years 4 months ago
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low-cost ...
Xiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquell...
ICDM
2008
IEEE
120views Data Mining» more  ICDM 2008»
14 years 4 months ago
Anti-monotonic Overlap-Graph Support Measures
In graph mining, a frequency measure is anti-monotonic if the frequency of a pattern never exceeds the frequency of a subpattern. The efficiency and correctness of most graph pat...
Toon Calders, Jan Ramon, Dries Van Dyck
VTC
2008
IEEE
125views Communications» more  VTC 2008»
14 years 4 months ago
Wireless Broadband Services using Smart Caching
— Broadband access for all will be a key functionality in future mobile radio networks. Depending on the length and the characteristic of the radio wave propagation the performan...
Stephan Goebbels
ALGOSENSORS
2004
Springer
14 years 3 months ago
Multi: A Hybrid Adaptive Dissemination Protocol for Wireless Sensor Networks
Abstract. Data dissemination (routing) is a basic function in wireless sensor networks. Dissemination algorithms for those networks depend on the characteristics of the application...
Carlos Mauricio S. Figueiredo, Eduardo Freire Naka...