Sciweavers

14424 search results - page 2790 / 2885
» Modeling Radio Networks
Sort
View
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
16 years 3 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
POPL
2008
ACM
16 years 2 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
227
Voted
POPL
2005
ACM
16 years 2 months ago
Enterprise privacy promises and enforcement
Several formal languages have been proposed to encode privacy policies, ranging from the Platform for Privacy Preferences (P3P), intended for communicating privacy policies to con...
Adam Barth, John C. Mitchell
136
Voted
STOC
2006
ACM
122views Algorithms» more  STOC 2006»
16 years 2 months ago
Fast convergence to Wardrop equilibria by adaptive sampling methods
We study rerouting policies in a dynamic round-based variant of a well known game theoretic traffic model due to Wardrop. Previous analyses (mostly in the context of selfish routi...
Simon Fischer, Harald Räcke, Berthold Vö...
126
Voted
STOC
2005
ACM
129views Algorithms» more  STOC 2005»
16 years 2 months ago
Learning with attribute costs
We study an extension of the "standard" learning models to settings where observing the value of an attribute has an associated cost (which might be different for differ...
Haim Kaplan, Eyal Kushilevitz, Yishay Mansour
« Prev « First page 2790 / 2885 Last » Next »