Sciweavers

145 search results - page 24 / 29
» sac 2009
Sort
View
SAC
2009
ACM
14 years 3 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
SAC
2009
ACM
14 years 3 months ago
An ontology-based application in heart electrophysiology: representation, reasoning and visualization on the web
Computational technologies have been increasingly explored to make biomedical knowledge and data more accessible for human understanding, comparison, analysis and communication. I...
Bernardo Gonçalves, Veruska Zamborlini, Gia...
SAC
2009
ACM
14 years 3 months ago
Towards the universal semantic assessment of accessibility
The ever increasing adoption of software technologies has bring closer technology to users with disabilities and users that interact with devices other than a PC. This diversific...
Rui Lopes, Konstantinos Votis, Luís Carri&c...
SAC
2009
ACM
14 years 3 months ago
Towards developing a trust-based security solution
Wireless sensor network has emerged as a new information and data gathering paradigm based on the collaborative efforts of a large number of autonomous sensing devices. With small...
Sheikh Iqbal Ahamed, Donghyun Kim, Chowdhury Shari...
SAC
2009
ACM
14 years 5 months ago
Applying latent dirichlet allocation to group discovery in large graphs
This paper introduces LDA-G, a scalable Bayesian approach to finding latent group structures in large real-world graph data. Existing Bayesian approaches for group discovery (suc...
Keith Henderson, Tina Eliassi-Rad