Sciweavers

206 search results - page 35 / 42
» On the tradeoff between privacy and utility in data publishi...
Sort
View
IKE
2003
13 years 8 months ago
A Statistics-Based Approach to Incrementally Update Inverted Files
Many information retrieval systems use the inverted file as indexing structure. The inverted file, however, is not suited to supporting incremental updates when new documents are ...
Wann-Yun Shieh, Chung-Ping Chung
BMCBI
2008
96views more  BMCBI 2008»
13 years 7 months ago
A PATO-compliant zebrafish screening database (MODB): management of morpholino knockdown screen information
Background: The zebrafish is a powerful model vertebrate amenable to high throughput in vivo genetic analyses. Examples include reverse genetic screens using morpholino knockdown,...
Michelle N. Knowlton, Tongbin Li, Yongliang Ren, B...
SAC
2009
ACM
14 years 5 days ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
COMCOM
2008
91views more  COMCOM 2008»
13 years 7 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 1 months ago
Peeking Through the Cloud: DNS-Based Estimation and Its Applications
Reliable network demographics are quickly becoming a much sought-after digital commodity. However, as the need for more refined Internet demographics has grown, so too has the ten...
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, ...