Sciweavers

2302 search results - page 399 / 461
» Privacy-preserving Distributed Clustering using Generative M...
Sort
View
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 9 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
123
Voted
GLVLSI
2000
IEEE
145views VLSI» more  GLVLSI 2000»
15 years 7 months ago
CMOS system-on-a-chip voltage scaling beyond 50nm
† The limits on CMOS energy dissipation imposed by subthreshold leakage currents and by wiring capacitance are investigated for CMOS generations beyond 50nm at NTRS projected loc...
Azeez J. Bhavnagarwala, Blanca Austin, Ashok Kapoo...
COLT
2006
Springer
15 years 6 months ago
Learning Rational Stochastic Languages
Given a finite set of words w1, . . . , wn independently drawn according to a fixed unknown distribution law P called a stochastic language, an usual goal in Grammatical Inference ...
François Denis, Yann Esposito, Amaury Habra...
HOTOS
2003
IEEE
15 years 7 months ago
Towards a Semantic-Aware File Store
—Traditional hierarchical namespaces are not sufficient for representing and managing the rich semantics of today’s storage systems. In this paper, we discuss the principles o...
Zhichen Xu, Magnus Karlsson, Chunqiang Tang, Chris...
ICDE
2006
IEEE
163views Database» more  ICDE 2006»
16 years 3 months ago
A Sampling-Based Approach to Optimizing Top-k Queries in Sensor Networks
Wireless sensor networks generate a vast amount of data. This data, however, must be sparingly extracted to conserve energy, usually the most precious resource in battery-powered ...
Adam Silberstein, Carla Schlatter Ellis, Jun Yang ...