Sciweavers

739 search results - page 136 / 148
» Information Flow in Credential Systems
Sort
View
JMLR
2010
128views more  JMLR 2010»
13 years 2 months ago
Fluid Dynamics Models for Low Rank Discriminant Analysis
We consider the problem of reducing the dimensionality of labeled data for classification. Unfortunately, the optimal approach of finding the low-dimensional projection with minim...
Yung-Kyun Noh, Byoung-Tak Zhang, Daniel D. Lee
ICDE
2006
IEEE
204views Database» more  ICDE 2006»
14 years 9 months ago
Collaborative Business Process Support in IHE XDS through ebXML Business Processes
Currently, clinical information is stored in all kinds of proprietary formats through a multitude of medical information systems available on the market. This results in a severe ...
Asuman Dogac, Veli Bicer, Alper Okcan
WWW
2010
ACM
14 years 27 days ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham
TPDS
2008
78views more  TPDS 2008»
13 years 7 months ago
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
To detect and investigate self-propagating worm attacks against networked servers, the following capabilities are desirable: (1) raising timely alerts to trigger a worm investigat...
Xuxian Jiang, Florian P. Buchholz, Aaron Walters, ...
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 7 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg