Sciweavers

4233 search results - page 760 / 847
» Three Paths to Effectiveness
Sort
View
166
Voted
HPCA
2009
IEEE
16 years 4 months ago
Hardware-software integrated approaches to defend against software cache-based side channel attacks
Software cache-based side channel attacks present serious threats to modern computer systems. Using caches as a side channel, these attacks are able to derive secret keys used in ...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
MOBISYS
2009
ACM
16 years 4 months ago
Leakage-aware energy synchronization for wireless sensor networks
To ensure sustainable operations of wireless sensor systems, environmental energy harvesting has been regarded as the right solution for long-term applications. In energy-dynamic ...
Ting Zhu, Ziguo Zhong, Yu Gu, Tian He, Zhi-Li Zhan...
103
Voted
KDD
2008
ACM
121views Data Mining» more  KDD 2008»
16 years 4 months ago
Mining multi-faceted overviews of arbitrary topics in a text collection
A common task in many text mining applications is to generate a multi-faceted overview of a topic in a text collection. Such an overview not only directly serves as an informative...
Xu Ling, Qiaozhu Mei, ChengXiang Zhai, Bruce R. Sc...
143
Voted
KDD
2007
ACM
184views Data Mining» more  KDD 2007»
16 years 4 months ago
Correlation search in graph databases
Correlation mining has gained great success in many application domains for its ability to capture the underlying dependency between objects. However, the research of correlation ...
Yiping Ke, James Cheng, Wilfred Ng
137
Voted
KDD
2007
ACM
152views Data Mining» more  KDD 2007»
16 years 4 months ago
Privacy-Preserving Sharing of Horizontally-Distributed Private Data for Constructing Accurate Classifiers
Data mining tasks such as supervised classification can often benefit from a large training dataset. However, in many application domains, privacy concerns can hinder the construc...
Vincent Yan Fu Tan, See-Kiong Ng