Sciweavers

252 search results - page 40 / 51
» Practical Data-Hiding: Additive Attacks Performance Analysis
Sort
View
ICDM
2006
IEEE
147views Data Mining» more  ICDM 2006»
14 years 2 months ago
Adaptive Parallel Graph Mining for CMP Architectures
Mining graph data is an increasingly popular challenge, which has practical applications in many areas, including molecular substructure discovery, web link analysis, fraud detect...
Gregory Buehrer, Srinivasan Parthasarathy, Yen-Kua...
BMCBI
2011
13 years 3 months ago
PICS-Ord: Unlimited Coding of Ambiguous Regions by Pairwise Identity and Cost Scores Ordination
Background: We present a novel method to encode ambiguously aligned regions in fixed multiple sequence alignments by ‘Pairwise Identity and Cost Scores Ordination’ (PICS-Ord)....
Robert K. Luecking, Brendan P. Hodkinson, Alexandr...
PPNA
2011
13 years 3 months ago
Security and privacy issues in P2P streaming systems: A survey
Streaming applications over Peer-To-Peer (P2P) systems have gained an enormous popularity. Success always implies increased concerns about security, protection, privacy and all the...
Gabriela Gheorghe, Renato Lo Cigno, Alberto Montre...
OSDI
2006
ACM
14 years 9 months ago
Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable
In current commodity systems, applications have no way of limiting their trust in the underlying operating system (OS), leaving them at the complete mercy of an attacker who gains...
Richard Ta-Min, Lionel Litty, David Lie
ICDE
1999
IEEE
118views Database» more  ICDE 1999»
14 years 10 months ago
Maintaining Data Cubes under Dimension Updates
OLAP systems support data analysis through a multidimensional data model, according to which data facts are viewed as points in a space of application-related dimensions", or...
Carlos A. Hurtado, Alberto O. Mendelzon, Alejandro...