Sciweavers

3330 search results - page 641 / 666
» software 2010
Sort
View
ICDCS
2010
IEEE
14 years 28 days ago
Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining
—Wireless Sensor Network (WSN) applications are typically event-driven. While the source codes of these applications may look simple, they are executed with a complicated concurr...
Yangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchu...
ICDCS
2010
IEEE
14 years 28 days ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...
KDD
2010
ACM
203views Data Mining» more  KDD 2010»
14 years 28 days ago
Collusion-resistant privacy-preserving data mining
Recent research in privacy-preserving data mining (PPDM) has become increasingly popular due to the wide application of data mining and the increased concern regarding the protect...
Bin Yang, Hiroshi Nakagawa, Issei Sato, Jun Sakuma
PERCOM
2010
ACM
14 years 28 days ago
AutoGait: A mobile platform that accurately estimates the distance walked
—AutoGait is a mobile platform that autonomously discovers a user’s walking profile and accurately estimates the distance walked. The discovery is made by utilizing the GPS in...
Dae-Ki Cho, Min Mun, Uichin Lee, Williams J. Kaise...
SOUPS
2010
ACM
14 years 28 days ago
On the impact of real-time feedback on users' behaviour in mobile location-sharing applications
Effective privacy management requires that mobile systems‟ users be able to make informed privacy decisions as their experience and knowledge of a system progresses. Prior work ...
Lukasz Jedrzejczyk, Blaine A. Price, Arosha K. Ban...