Sciweavers

343 search results - page 53 / 69
» The All-In Publication Policy
Sort
View
GIS
2009
ACM
14 years 2 months ago
Towards modeling the traffic data on road networks
A spatiotemporal network is a spatial network (e.g., road network) along with the corresponding time-dependent weight (e.g., travel time) for each edge of the network. The design ...
Ugur Demiryurek, Bei Pan, Farnoush Banaei Kashani,...
CIKM
2006
Springer
14 years 2 months ago
An integer programming approach for frequent itemset hiding
The rapid growth of transactional data brought, soon enough, into attention the need of its further exploitation. In this paper, we investigate the problem of securing sensitive k...
Aris Gkoulalas-Divanis, Vassilios S. Verykios
ACSAC
2001
IEEE
14 years 2 months ago
Restricting Access with Certificate Attributes in Multiple Root Environments-A Recipe for Certificate Masquerading
The issue of certificate masquerading against the SSL protocol is pointed out in [4]. In [4], various forms of server certificate masquerading are identified. It should also be no...
James M. Hayes
CCS
2008
ACM
14 years 27 days ago
Spamalytics: an empirical analysis of spam marketing conversion
The "conversion rate" of spam -- the probability that an unsolicited e-mail will ultimately elicit a "sale" -- underlies the entire spam value proposition. How...
Chris Kanich, Christian Kreibich, Kirill Levchenko...
ELPUB
2008
ACM
14 years 20 days ago
African universities in the knowledge economy: a collaborative approach to researching and promoting open communications in high
This paper will describe the informal collaborative approach taken by a group of donor funders and researchers in southern and eastern Africa aimed at consolidating the results an...
Eve Gray, Mark Burke