Sciweavers

733 search results - page 112 / 147
» Private inference control
Sort
View
ESORICS
2010
Springer
13 years 8 months ago
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation
Abstract. We introduce a novel remotely-mounted attack that can expose the network identity of an anonymous client, hidden service, and anonymizing proxies. To achieve this, we emp...
Sambuddho Chakravarty, Angelos Stavrou, Angelos D....
BMCBI
2010
65views more  BMCBI 2010»
13 years 7 months ago
VIPR: A probabilistic algorithm for analysis of microbial detection microarrays
Background: All infectious disease oriented clinical diagnostic assays in use today focus on detecting the presence of a single, well defined target agent or a set of agents. In r...
Adam F. Allred, Guang Wu, Tuya Wulan, Kael F. Fisc...
BIOINFORMATICS
2005
152views more  BIOINFORMATICS 2005»
13 years 7 months ago
Intervention in context-sensitive probabilistic Boolean networks
Motivation: Intervention in a gene regulatory network is used to help it avoid undesirable states, such as those associated with a disease. Several types of intervention have been...
Ranadip Pal, Aniruddha Datta, Michael L. Bittner, ...
ICFP
2005
ACM
14 years 7 months ago
Types with semantics: soundness proof assistant
We present a parametric Hoare-like logic for computer-aided reasoning about typeable properties of functional programs. The logic is based on the concept of a specialised assertio...
Olha Shkaravska
CCS
2005
ACM
14 years 1 months ago
Automatic placement of authorization hooks in the linux security modules framework
We present a technique for automatic placement of authorization hooks, and apply it to the Linux security modules (LSM) framework. LSM is a generic framework which allows diverse ...
Vinod Ganapathy, Trent Jaeger, Somesh Jha