Sciweavers

8135 search results - page 1465 / 1627
» network 2008
Sort
View
NDSS
2008
IEEE
15 years 10 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters
213
Voted
AINA
2008
IEEE
15 years 10 months ago
Missing Value Estimation for Time Series Microarray Data Using Linear Dynamical Systems Modeling
The analysis of gene expression time series obtained from microarray experiments can be effectively exploited to understand a wide range of biological phenomena from the homeostat...
Connie Phong, Raul Singh
148
Voted
MOBISYS
2008
ACM
16 years 3 months ago
Cascadia: a system for specifying, detecting, and managing rfid events
Cascadia is a system that provides RFID-based pervasive computing applications with an infrastructure for specifying, extracting and managing meaningful high-level events from raw...
Evan Welbourne, Nodira Khoussainova, Julie Letchne...
NDSS
2008
IEEE
15 years 10 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
145
Voted
WCNC
2008
IEEE
15 years 10 months ago
Unequal Error Protection Irregular Over-Complete Mapping for Wavelet Coded Wireless Video Telephony Using Iterative Source and C
— Since the different bits of the compressed video sequence produced by the BBC’s wavelet-based video codec exhibit different error sensitivity, efficient Unequal Error Protec...
Anh Quang Pham, Lie-Liang Yang, Lajos Hanzo
« Prev « First page 1465 / 1627 Last » Next »