Sciweavers

169 search results - page 32 / 34
» Security policy analysis using deductive spreadsheets
Sort
View
MSOM
2010
65views more  MSOM 2010»
13 years 2 months ago
The Optimal Composition of Influenza Vaccines Subject to Random Production Yields
The Vaccine and Related Biologic Products Advisory Committee meets at least once a year to decide the composition of the influenza vaccine in the U.S. Past evidence suggests that ...
Soo-Haeng Cho
DRM
2003
Springer
14 years 18 days ago
Content and expression-based copy recognition for intellectual property protection
Protection of copyrights and revenues of content owners in the digital world has been gaining importance in the recent years. This paper presents a way of fingerprinting text docu...
Özlem Uzuner, Randall Davis
ACSAC
2007
IEEE
13 years 11 months ago
Efficient Detection of Delay-Constrained Relay Nodes
Relay nodes are a potential threat to networks since they are used in many malicious situations like stepping stone attacks, botnet communication, peer-to-peer streaming etc. Quic...
Baris Coskun, Nasir D. Memon
SIGCOMM
2009
ACM
14 years 1 months ago
PathForge: faithful anonymization of movement data
For most mobile networks, providers need the current position of their users to provide efficient service. The resulting motion data is not only an invaluable source for analyzing...
Sebastian Kay Belle, Marcel Waldvogel, Oliver Haas...
ICDM
2006
IEEE
139views Data Mining» more  ICDM 2006»
14 years 1 months ago
Privacy Preserving Nearest Neighbor Search
Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privac...
Mark Shaneck, Yongdae Kim, Vipin Kumar