Sciweavers

2084 search results - page 333 / 417
» Knowledge Exploitation from the Web
Sort
View
WWW
2009
ACM
14 years 10 months ago
To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles
In order to address privacy concerns, many social media websites allow users to hide their personal profiles from the public. In this work, we show how an adversary can exploit an...
Elena Zheleva, Lise Getoor
CHES
2009
Springer
157views Cryptology» more  CHES 2009»
14 years 9 months ago
Differential Cluster Analysis
Abstract. We propose a new technique called Differential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions ...
Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Ru...
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
14 years 9 months ago
Turning CARTwheels: an alternating algorithm for mining redescriptions
We present an unusual algorithm involving classification trees-CARTwheels--where two trees are grown in opposite directions so that they are joined at their leaves. This approach ...
Naren Ramakrishnan, Deept Kumar, Bud Mishra, Malco...
MOBIHOC
2008
ACM
14 years 8 months ago
Cooperative transmit-power estimation under wireless fading
We study blind estimation of transmission power of a node based on received power measurements obtained under wireless fading. Specifically, the setup consists of a set of monitor...
Murtaza Zafer, Bongjun Ko, Ivan Wang Hei Ho
ICWS
2009
IEEE
14 years 6 months ago
Towards Probabilistic Estimation of Quality of Online Services
Accurate estimation of quality of online services is both an important and difficult problem, since a service has many interdependent quality attributes influenced by several co...
Le-Hung Vu, Karl Aberer