Sciweavers

12257 search results - page 2144 / 2452
» Analysis of Algorithms
Sort
View
WWW
2010
ACM
15 years 9 months ago
Privacy in dynamic social networks
Recent work on anonymizing online social networks (OSNs) has looked at privacy preserving techniques for publishing a single instance of the network. However, OSNs evolve and a si...
Smriti Bhagat, Graham Cormode, Balachander Krishna...
ACSAC
2003
IEEE
15 years 9 months ago
Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS
Over the past decade, Intrusion Detection Systems (IDS) have improved steadily in the efficiency and effectiveness with which they detect intrusive activity. This is particularly ...
Nathan Carey, George M. Mohay, Andrew Clark
CGO
2003
IEEE
15 years 9 months ago
Hiding Program Slices for Software Security
Given the high cost of producing software, development of technology for prevention of software piracy is important for the software industry. In this paper we present a novel app...
Xiangyu Zhang, Rajiv Gupta
CSB
2003
IEEE
135views Bioinformatics» more  CSB 2003»
15 years 9 months ago
Stepping Up the Pace of Discovery: the Genomes to Life Program
Genomes to Life (GTL), the U.S. Department of Energy Office of Science’s systems biology program, focuses on environmental microbiology. Over the next 10 to 20 years, GTL’s ke...
Marvin Frazier, David Thomassen, Aristides Patrino...
DATE
2003
IEEE
128views Hardware» more  DATE 2003»
15 years 9 months ago
Virtual Compression through Test Vector Stitching for Scan Based Designs
We propose a technique for compressing test vectors. The technique reduces test application time and tester memory requirements by utilizing part of the predecessor response in co...
Wenjing Rao, Alex Orailoglu
« Prev « First page 2144 / 2452 Last » Next »