Sciweavers

593 search results - page 94 / 119
» Inferring private information using social network data
Sort
View
FGCN
2008
IEEE
155views Communications» more  FGCN 2008»
13 years 9 months ago
Modeling the Marginal Distribution of Gene Expression with Mixture Models
We report the results of fitting mixture models to the distribution of expression values for individual genes over a broad range of normal tissues, which we call the marginal expr...
Edward Wijaya, Hajime Harada, Paul Horton
IJICST
2011
118views more  IJICST 2011»
12 years 11 months ago
Identification, Transparency, Interactivity: Towards a New Paradigm for Credibility for Single-Voice Blogs
This article explores traditional conceptualizations of credibility relying on quantitative and qualitative analyses of data collected by the Institute for the Future of the Book,...
Brian Carroll, R. Randolph Richardson
IADIS
2003
13 years 9 months ago
DENOFAS: A Vulnerability Assessment Tool
This paper describes the development of a software tool for detection of vulnerabilities in networked systems, using public available security resources. Our tool builds is knowle...
Rui Costa Cardoso, Mário M. Freire
INFOCOM
2012
IEEE
11 years 10 months ago
Origin-destination flow measurement in high-speed networks
—An origin-destination (OD) flow between two routers is the set of packets that pass both routers in a network. Measuring the sizes of OD flows is important to many network man...
Tao Li, Shigang Chen, Yan Qiao
IEEEHPCS
2010
13 years 2 months ago
XPSoC: A reconfigurable solution for multimedia contents protection
Network Multimedia data also need to be encrypted to protect private content and access control. Considering performance constraints and embedded system issues, many hardware solu...
Linfeng Ye, Jean-Philippe Diguet, Guy Gogniat