Sciweavers

963 search results - page 190 / 193
» Escape Analysis on Lists
Sort
View
CORR
2011
Springer
196views Education» more  CORR 2011»
13 years 1 months ago
Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions
In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedbac...
Michael T. Goodrich, Florian Kerschbaum
ACSAC
2010
IEEE
13 years 1 months ago
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same ne...
Baris Coskun, Sven Dietrich, Nasir D. Memon
BMCBI
2011
13 years 1 months ago
Cell Subset Prediction for Blood Genomic Studies
Background: Genome-wide transcriptional profiling of patient blood samples offers a powerful tool to investigate underlying disease mechanisms and personalized treatment decisions...
Christopher R. Bolen, Mohamed Uduman, Steven H. Kl...
CHI
2011
ACM
13 years 1 months ago
Enhancing credibility judgment of web search results
In this paper, we propose a system for helping users to judge the credibility of Web search results and to search for credible Web pages. Conventional Web search engines present o...
Yusuke Yamamoto, Katsumi Tanaka
EUROSYS
2011
ACM
13 years 1 months ago
CloneCloud: elastic execution between mobile device and cloud
Mobile applications are becoming increasingly ubiquitous and provide ever richer functionality on mobile devices. At the same time, such devices often enjoy strong connectivity wi...
Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, May...