Sciweavers

1368 search results - page 246 / 274
» Signal Probability Based Statistical Timing Analysis
Sort
View
SEC
2008
13 years 9 months ago
Hiding in Groups: On the Expressiveness of Privacy Distributions
Many applications inherently disclose information because perfect privacy protection is prohibitively expensive. RFID tags, for example, cannot be equipped with the cryptographic p...
Karsten Nohl, David Evans
IEEEHPCS
2010
13 years 5 months ago
Using replication and checkpointing for reliable task management in computational Grids
In grid computing systems, providing fault-tolerance is required for both scientific computation and file-sharing to increase their reliability. In previous works, several mechani...
Sangho Yi, Derrick Kondo, Bongjae Kim, Geunyoung P...
SDM
2012
SIAM
282views Data Mining» more  SDM 2012»
11 years 10 months ago
Citation Prediction in Heterogeneous Bibliographic Networks
To reveal information hiding in link space of bibliographical networks, link analysis has been studied from different perspectives in recent years. In this paper, we address a no...
Xiao Yu, Quanquan Gu, Mianwei Zhou, Jiawei Han
SIGIR
2010
ACM
13 years 11 months ago
Uncovering social spammers: social honeypots + machine learning
Web-based social systems enable new community-based opportunities for participants to engage, share, and interact. This community value and related services like search and advert...
Kyumin Lee, James Caverlee, Steve Webb
KDD
2004
ACM
209views Data Mining» more  KDD 2004»
14 years 8 months ago
Tracking dynamics of topic trends using a finite mixture model
In a wide range of business areas dealing with text data streams, including CRM, knowledge management, and Web monitoring services, it is an important issue to discover topic tren...
Satoshi Morinaga, Kenji Yamanishi