Sciweavers

501 search results - page 36 / 101
» Redundancy and Diversity in Security
Sort
View
PRL
2006
130views more  PRL 2006»
13 years 8 months ago
Efficient huge-scale feature selection with speciated genetic algorithm
With increasing interest in bioinformatics, sophisticated tools are required to efficiently analyze gene information. The classification of gene expression profiles is crucial in ...
Jin-Hyuk Hong, Sung-Bae Cho
ICDCIT
2004
Springer
14 years 1 months ago
Vulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
Bharat K. Bhargava, Leszek Lilien
HUC
2009
Springer
14 years 19 days ago
A spotlight on security and privacy risks with future household robots: attacks and lessons
Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household r...
Tamara Denning, Cynthia Matuszek, Karl Koscher, Jo...
SIGMOD
2009
ACM
171views Database» more  SIGMOD 2009»
14 years 8 months ago
Secure outsourced aggregation via one-way chains
We consider the Outsourced Aggregation model, where sensing services outsource their sensor data collection and aggregation tasks to third-party service providers called aggregato...
Suman Nath, Haifeng Yu, Haowen Chan
ICDCS
2000
IEEE
14 years 13 days ago
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
The increasing popularity and diversity of collaborative applications prompts a need for highly secure and reliable communication platforms for dynamic peer groups. Security mecha...
Jonathan Robert Stanton, Yair Amir, Damian Hasse, ...