Sciweavers

185 search results - page 25 / 37
» A Metrics Framework to Drive Application Security Improvemen...
Sort
View
KDD
2004
ACM
159views Data Mining» more  KDD 2004»
15 years 2 months ago
Optimal randomization for privacy preserving data mining
Randomization is an economical and efficient approach for privacy preserving data mining (PPDM). In order to guarantee the performance of data mining and the protection of individ...
Michael Yu Zhu, Lei Liu
101
Voted
COLCOM
2007
IEEE
15 years 3 months ago
Peer2Schedule - an experimental peer-to-peer application to support present collaboration
Abstract—This paper describes experiences from implementing an experimental mobile peer-to-peer application called Peer2Schedule aimed at improving and supporting collaboration w...
Alf Inge Wang, Peter Nicolai Motzfeldt
CVPR
2007
IEEE
15 years 11 months ago
Statistical Shape Analysis of Multi-Object Complexes
An important goal of statistical shape analysis is the discrimination between populations of objects, exploring group differences in morphology not explained by standard volumetri...
Kevin Gorczowski, Martin Styner, Ja-Yeon Jeong, J....
90
Voted
TRIDENTCOM
2006
IEEE
15 years 3 months ago
Cross-layer multi-hop wireless routing for inter-vehicle communication
— Ad-hoc networking provides a cost-effective support structure for inter-vehicle communication. A decentralized peerto-peer information dissemination architecture is well suited...
Jatinder Pal Singh, Nicholas Bambos, Bhaskar Srini...
ISPASS
2005
IEEE
15 years 3 months ago
Analysis of Network Processing Workloads
Abstract— Network processing is becoming an increasingly important paradigm as the Internet moves towards an architecture with more complex functionality inside the network. Mode...
Ramaswamy Ramaswamy, Ning Weng, Tilman Wolf