Sciweavers

65 search results - page 9 / 13
» Identifying Sensitive Associations in Databases for Release ...
Sort
View
BMCBI
2010
147views more  BMCBI 2010»
13 years 7 months ago
CNstream: A method for the identification and genotyping of copy number polymorphisms using Illumina microarrays
Background: Understanding the genetic basis of disease risk in depth requires an exhaustive knowledge of the types of genetic variation. Very recently, Copy Number Variants (CNVs)...
Arnald Alonso, Antonio Julià, Raül Tor...
USENIX
2007
13 years 9 months ago
Dynamic Spyware Analysis
Spyware is a class of malicious code that is surreptitiously installed on victims’ machines. Once active, it silently monitors the behavior of users, records their web surfing ...
Manuel Egele, Christopher Kruegel, Engin Kirda, He...
SACMAT
2010
ACM
13 years 5 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu
NDSS
1998
IEEE
13 years 11 months ago
Enabling the Internet White Pages Service - the Directory Guardian
The Internet White Pages Service (IWPS) has been slow to materialise for many reasons. One of them is the security concerns that organisations have, over allowing the public to ga...
David W. Chadwick, Andrew J. Young
ICDE
2006
IEEE
207views Database» more  ICDE 2006»
14 years 8 months ago
Automatic Sales Lead Generation from Web Data
Speed to market is critical to companies that are driven by sales in a competitive market. The earlier a potential customer can be approached in the decision making process of a p...
Ganesh Ramakrishnan, Sachindra Joshi, Sumit Negi, ...