Sciweavers

808 search results - page 82 / 162
» Distributed Anonymization: Achieving Privacy for Both Data S...
Sort
View
CCS
2009
ACM
14 years 2 months ago
Countering kernel rootkits with lightweight hook protection
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many rootkits hijack control flows by modifying control d...
Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning
CIKM
2003
Springer
14 years 1 months ago
Hierarchical graph indexing
Traffic analysis, in the context of Telecommunications or Internet and Web data, is crucial for large network operations. Data in such networks is often provided as large graphs w...
James Abello, Yannis Kotidis
AAAI
1996
13 years 9 months ago
A Clinician's Tool for Analyzing Non-Compliance
We describe a computer program to assist a clinician with assessing the e cacy of treatments in experimental studies for which treatment assignment is random but subject complianc...
David Maxwell Chickering, Judea Pearl
KDD
2005
ACM
160views Data Mining» more  KDD 2005»
14 years 8 months ago
Optimizing time series discretization for knowledge discovery
Knowledge Discovery in time series usually requires symbolic time series. Many discretization methods that convert numeric time series to symbolic time series ignore the temporal ...
Alfred Ultsch, Fabian Mörchen
CCS
2009
ACM
14 years 2 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...