Sciweavers

3146 search results - page 3 / 630
» Efficient Consequence Finding
Sort
View
DATE
2007
IEEE
119views Hardware» more  DATE 2007»
13 years 12 months ago
Experimental evaluation of protections against laser-induced faults and consequences on fault modeling
Lasers can be used by hackers to situations to inject faults in circuits and induce security flaws. On-line detection mechanisms are classically proposed to counter such attacks, ...
Régis Leveugle, Abdelaziz Ammari, V. Maingo...
WWW
2009
ACM
14 years 6 months ago
What makes conversations interesting?: themes, participants and consequences of conversations in online social media
Rich media social networks promote not only creation and consumption of media, but also communication about the posted media item. What causes a conversation to be interesting, th...
Ajita John, Dorée D. Seligmann, Hari Sundar...
IMCS
2007
144views more  IMCS 2007»
13 years 5 months ago
On the imbalance of the security problem space and its expected consequences
Purpose – This paper aims to report on the results of an analysis of the computer security problem space, to suggest the areas with highest potential for making progress in the ...
Konstantin Beznosov, Olga Beznosova
VLDB
2005
ACM
153views Database» more  VLDB 2005»
14 years 5 months ago
An effective and efficient algorithm for high-dimensional outlier detection
Abstract. The outlier detection problem has important applications in the field of fraud detection, network robustness analysis, and intrusion detection. Most such applications are...
Charu C. Aggarwal, Philip S. Yu
IDEAL
2010
Springer
13 years 3 months ago
An Efficient Approach to Clustering Real-Estate Listings
World Wide Web (WWW) is a vast source of information, the problem of information overload is more acute than ever. Due to noise in WWW, it is becoming hard to find usable informati...
Maciej Grzenda, Deepak Thukral