Sciweavers

1625 search results - page 226 / 325
» Privacy-preserving data publishing
Sort
View
ACSAC
2008
IEEE
15 years 10 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
DATE
2008
IEEE
226views Hardware» more  DATE 2008»
15 years 10 months ago
A General Method to Evaluate RF BIST Techniques Based on Non-parametric Density Estimation
Abstract— We present a general method to evaluate RF BuiltIn Self-Test (BIST) techniques during the design stage. In particular, the adaptive kernel estimator is used to construc...
Haralampos-G. D. Stratigopoulos, Jeanne Tongbong, ...
ICASSP
2008
IEEE
15 years 10 months ago
Recent results of rainfall mapping from cellular network measurements
Electromagnetic waves are known to be influenced by atmospheric conditions. Therefore, wireless communications, in which electromagnetic signals carry the information, can be used...
Hagit Messer, Oren Goldshtein, Asaf Rayitsfeld, Pi...
ICPR
2008
IEEE
15 years 10 months ago
Topologically correct surface reconstruction using alpha shapes and relations to ball-pivoting
The problem to reconstruct a surface given a finite set of boundary points is of growing interest, e.g. in the context of laser range images. While a lot of heuristic methods hav...
Peer Stelldinger
NDSS
2008
IEEE
15 years 10 months ago
Analyzing Privacy in Enterprise Packet Trace Anonymization
Accurate network measurement through trace collection is critical for advancing network design and for maintaining secure, reliable networks. Unfortunately, the release of network...
Bruno F. Ribeiro, Weifeng Chen, Gerome Miklau, Don...