Sciweavers

2912 search results - page 579 / 583
» Overlay Networks - Implementation by Specification
Sort
View
ACSAC
2010
IEEE
13 years 5 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
ASIACRYPT
2010
Springer
13 years 5 months ago
Structured Encryption and Controlled Disclosure
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
Melissa Chase, Seny Kamara
ICCAD
2010
IEEE
148views Hardware» more  ICCAD 2010»
13 years 5 months ago
Trace signal selection to enhance timing and logic visibility in post-silicon validation
Trace buffer technology allows tracking the values of a few number of state elements inside a chip within a desired time window, which is used to analyze logic errors during post-s...
Hamid Shojaei, Azadeh Davoodi
ICMLA
2010
13 years 5 months ago
Semi-Supervised Anomaly Detection for EEG Waveforms Using Deep Belief Nets
Abstract--Clinical electroencephalography (EEG) is routinely used to monitor brain function in critically ill patients, and specific EEG waveforms are recognized by clinicians as s...
Drausin Wulsin, Justin Blanco, Ram Mani, Brian Lit...
SAGT
2010
Springer
186views Game Theory» more  SAGT 2010»
13 years 5 months ago
On the Efficiency of Markets with Two-Sided Proportional Allocation Mechanisms
We analyze the performance of single-parameter mechanisms for markets in which there is competition amongst both consumers and suppliers (namely, two-sided markets). Specifically, ...
Volodymyr Kuleshov, Adrian Vetta