Sciweavers

211 search results - page 37 / 43
» Towards Security Evaluation Based on Evidence Collection
Sort
View
ACSAC
2010
IEEE
13 years 4 months ago
Who is tweeting on Twitter: human, bot, or cyborg?
Twitter is a new web application playing dual roles of online social networking and micro-blogging. Users communicate with each other by publishing text-based posts. The popularit...
Zi Chu, Steven Gianvecchio, Haining Wang, Sushil J...
BMCBI
2006
144views more  BMCBI 2006»
13 years 7 months ago
Association algorithm to mine the rules that govern enzyme definition and to classify protein sequences
Background: The number of sequences compiled in many genome projects is growing exponentially, but most of them have not been characterized experimentally. An automatic annotation...
Shih-Hau Chiu, Chien-Chi Chen, Gwo-Fang Yuan, Thy-...
SENSYS
2010
ACM
13 years 5 months ago
Privacy-aware regression modeling of participatory sensing data
Many participatory sensing applications use data collected by participants to construct a public model of a system or phenomenon. For example, a health application might compute a...
Hossein Ahmadi, Nam Pham, Raghu K. Ganti, Tarek F....
TWC
2008
154views more  TWC 2008»
13 years 7 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
WPES
2004
ACM
14 years 26 days ago
Private collaborative forecasting and benchmarking
Suppose a number of hospitals in a geographic area want to learn how their own heart-surgery unit is doing compared with the others in terms of mortality rates, subsequent complic...
Mikhail J. Atallah, Marina Bykova, Jiangtao Li, Ke...