Sciweavers

186 search results - page 27 / 38
» Generalized deviations in risk analysis
Sort
View
CCS
2008
ACM
13 years 10 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
RECOMB
2004
Springer
14 years 8 months ago
Chromosomal breakpoint re-use in the inference of genome sequence rearrangement
In order to apply gene-order rearrangement algorithms to the comparison of genome sequences, Pevzner and Tesler [9] bypass gene finding and ortholog identification, and use the or...
David Sankoff, Phil Trinh
CCS
2009
ACM
14 years 2 months ago
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, servic...
Jessica Staddon
WECWIS
2005
IEEE
94views ECommerce» more  WECWIS 2005»
14 years 1 months ago
Electronic Trading in Order-Driven Markets: Efficient Execution
In this paper, we address the importance of efficient execution in electronic markets. Due to intense competition for profit opportunities, trading costs can represent a significa...
Yuriy Nevmyvaka, Michael S. Kearns, Amy Papandreou...
CSREASAM
2009
13 years 9 months ago
A Service Framework based on Grades of IdPs and SPs
In Web services, a framework for the separation of authentication (IdP) and services (SP) has been proposed and actually deployed. In this framework, quality of information provide...
Sato Hiroyuki