Sciweavers

173 search results - page 35 / 35
» Classification of RFID Attacks
Sort
View
SDM
2010
SIAM
256views Data Mining» more  SDM 2010»
13 years 6 months ago
The Application of Statistical Relational Learning to a Database of Criminal and Terrorist Activity
We apply statistical relational learning to a database of criminal and terrorist activity to predict attributes and event outcomes. The database stems from a collection of news ar...
B. Delaney, Andrew S. Fast, W. M. Campbell, C. J. ...
HUC
2010
Springer
13 years 6 months ago
Groupthink: usability of secure group association for wireless devices
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ers...
BMCBI
2007
106views more  BMCBI 2007»
13 years 5 months ago
In silico identification of NF-kappaB-regulated genes in pancreatic beta-cells
Background: Pancreatic beta-cells are the target of an autoimmune attack in type 1 diabetes mellitus (T1DM). This is mediated in part by cytokines, such as interleukin (IL)-1β an...
Najib Naamane, Jacques van Helden, Decio L. Eiziri...