Sciweavers

6195 search results - page 1118 / 1239
» Cloud Computing Security
Sort
View
TON
2002
144views more  TON 2002»
15 years 4 months ago
Algorithms for provisioning virtual private networks in the hose model
Virtual Private Networks (VPNs) provide customers with predictable and secure network connections over a shared network. The recently proposed hose model for VPNs allows for great...
Amit Kumar, Rajeev Rastogi, Abraham Silberschatz, ...
SAC
2010
ACM
15 years 3 months ago
The 'Dresden Image Database' for benchmarking digital image forensics
This paper introduces and documents a novel image database specifically built for the purpose of development and benchmarking of camera-based digital forensic techniques. More th...
Thomas Gloe, Rainer Böhme
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
17 years 4 months ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li

Book
3101views
17 years 3 months ago
Steven Shreve: Stochastic Calculus and Finance
This is a great draft book about stochastic calculus and finance. It covers large number of topics such as Introduction to Probability Theory, Conditional Expectation, Arbitrage Pr...
Prasad Chalasani, Somesh Jha
ICML
2009
IEEE
16 years 5 months ago
Multi-assignment clustering for Boolean data
Conventional clustering methods typically assume that each data item belongs to a single cluster. This assumption does not hold in general. In order to overcome this limitation, w...
Andreas P. Streich, Mario Frank, David A. Basin, J...
« Prev « First page 1118 / 1239 Last » Next »