Sciweavers

SOCIALCOM
2010
13 years 6 months ago
A Multi-factor Approach to Securing Software on Client Computing Platforms
Protecting the integrity of software platforms, especially in unmanaged consumer computing systems is a difficult problem. Attackers may attempt to execute buffer overflow attacks ...
Raghunathan Srinivasan, Vivek Iyer, Amit Kanitkar,...
SOCIALCOM
2010
13 years 6 months ago
Incentive Compatible Distributed Data Mining
Abstract--In this paper, we propose a game-theoretic mechanism to encourage truthful data sharing for distributed data mining. Our proposed mechanism uses the classic VickreyClarke...
Murat Kantarcioglu, Robert Nix
RFIDSEC
2010
13 years 6 months ago
EC-RAC: Enriching a Capacious RFID Attack Collection
Abstract. We demonstrate two classes of attacks on EC-RAC, a growing set of RFID protocols. Our first class of attacks concerns the compositional approach used to construct a parti...
Ton van Deursen, Sasa Radomirovic
MSOM
2010
65views more  MSOM 2010»
13 years 6 months ago
The Optimal Composition of Influenza Vaccines Subject to Random Production Yields
The Vaccine and Related Biologic Products Advisory Committee meets at least once a year to decide the composition of the influenza vaccine in the U.S. Past evidence suggests that ...
Soo-Haeng Cho
MSCS
2010
59views more  MSCS 2010»
13 years 6 months ago
Observing the superposition of a single particle with the vacuum
Luis Manuel Rico Gutierrez, Veiko Palge, Jacob Dun...
MSCS
2010
73views more  MSCS 2010»
13 years 6 months ago
Modal and mixed specifications: key decision problems and their complexities
Adam Antonik, Michael Huth, Kim G. Larsen, Ulrik N...
MR
2010
219views Robotics» more  MR 2010»
13 years 6 months ago
Applications of TEM imaging, analysis and electron holography to III-nitride HEMT devices
David J. Smith, David A. Cullen, Lin Zhou, Martha ...
MP
2010
163views more  MP 2010»
13 years 6 months ago
Speeding up IP-based algorithms for constrained quadratic 0-1 optimization
In many practical applications, the task is to optimize a non-linear objective function over the vertices of a well-studied polytope as, e.g., the matching polytope or the travelli...
Christoph Buchheim, Frauke Liers, Marcus Oswald