Sciweavers

1423 search results - page 279 / 285
» Secure and Efficient Data Collection in Sensor Networks
Sort
View
CASCON
2010
174views Education» more  CASCON 2010»
13 years 6 months ago
Smart Services Across the Real and Virtual Worlds
Today, we are witnessing a new level of scale, complexity, and pervasiveness of software systems that are designed to support much more holistically complex processes. Much richer...
Eleni Stroulia
CN
2006
89views more  CN 2006»
13 years 8 months ago
A flexible concast-based grouping service
Abstract. We present a scalable and flexible grouping service based on concast and best-effort single-source multicast. The service assigns participating end systems to specific gr...
Amit Sehgal, Kenneth L. Calvert, Jim Griffioen
SP
2008
IEEE
122views Security Privacy» more  SP 2008»
13 years 8 months ago
Large-scale phylogenetic analysis on current HPC architectures
Abstract. Phylogenetic inference is considered a grand challenge in Bioinformatics due to its immense computational requirements. The increasing popularity and availability of larg...
Michael Ott, Jaroslaw Zola, Srinivas Aluru, Andrew...
CCS
2008
ACM
13 years 10 months ago
Privacy oracle: a system for finding application leaks with black box differential testing
We describe the design and implementation of Privacy Oracle, a system that reports on application leaks of user information via the network traffic that they send. Privacy Oracle ...
Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David W...
TKDE
2008
125views more  TKDE 2008»
13 years 8 months ago
Discovering and Explaining Abnormal Nodes in Semantic Graphs
An important problem in the area of homeland security is to identify abnormal or suspicious entities in large datasets. Although there are methods from data mining and social netwo...
Shou-de Lin, Hans Chalupsky