Sciweavers

63 search results - page 8 / 13
» On the detection of singularities of a periodic function
Sort
View
CSFW
2011
IEEE
12 years 7 months ago
Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection
Abstract—Audit mechanisms are essential for privacy protection in permissive access control regimes, such as in hospitals where denying legitimate access requests can adversely a...
Jeremiah Blocki, Nicolas Christin, Anupam Datta, A...
WEBI
2004
Springer
14 years 26 days ago
Self-Protection of Web Content
In most Internet applications, there is little control on how to protect the data content once it reaches the client. Implementing centralized control for data content delivered t...
Hoi Chan, Trieu C. Chieu
RECOMB
2001
Springer
14 years 7 months ago
Analysis techniques for microarray time-series data
We address possible limitations of publicly available data sets of yeast gene expression. We study the predictability of known regulators via time-series analysis, and show that l...
Vladimir Filkov, Steven Skiena, Jizu Zhi
ADHOCNOW
2003
Springer
14 years 23 days ago
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks
Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. This assumption renders wireless ad hoc networks vulnerable to...
Mike Just, Evangelos Kranakis, Tao Wan
ICST
2008
IEEE
14 years 1 months ago
Scheduling Timed Modules for Correct Resource Sharing
Real-time embedded systems typically include concurrent tasks of different priorities with time-dependent operations accessing common resources. In this context, unsynchronized pa...
Cristina Cerschi Seceleanu, Paul Pettersson, Hans ...