Sciweavers

8067 search results - page 1447 / 1614
» A Model Proposal of the Interoperability Problem
Sort
View
CRYPTO
2003
Springer
87views Cryptology» more  CRYPTO 2003»
15 years 10 months ago
Private Circuits: Securing Hardware against Probing Attacks
Can you guarantee secrecy even if an adversary can eavesdrop on your brain? We consider the problem of protecting privacy in circuits, when faced with an adversary that can access ...
Yuval Ishai, Amit Sahai, David Wagner
ASUNAM
2009
IEEE
15 years 10 months ago
Filtering Spam in Social Tagging System with Dynamic Behavior Analysis
—Spam in social tagging systems introduced by some malicious participants has become a serious problem for its global popularizing. Some studies which can be deduced to static us...
Bo Liu, Ennan Zhai, Huiping Sun, Yelu Chen, Zhong ...
ANSS
2002
IEEE
15 years 10 months ago
A Simulation Based Performance Analysis of a TCP Extension for Best-Effort Multimedia Applications
Since TCP is considered unsuitable for the majority of the emerging multimedia applications, these applications primarily use UDP transport together with proprietary congestion co...
Karl-Johan Grinnemo, Anna Brunstrom
MCS
2010
Springer
15 years 10 months ago
An Experimental Comparison of Hierarchical Bayes and True Path Rule Ensembles for Protein Function Prediction
Abstract. The computational genome-wide annotation of gene functions requires the prediction of hierarchically structured functional classes and can be formalized as a multiclass, ...
Matteo Re, Giorgio Valentini
CSE
2009
IEEE
15 years 9 months ago
Quantifying Utility and Trustworthiness for Advice Shared on Online Social Media
—The growing popularity of social media in recent years has resulted in the creation of an enormous amount of user-developed content. While information is readily available, ther...
Sai T. Moturu, Jian Yang, Huan Liu
« Prev « First page 1447 / 1614 Last » Next »