Sciweavers

9405 search results - page 1624 / 1881
» Computing a Model of Set Theory
Sort
View
CCS
2010
ACM
15 years 4 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
CEC
2010
IEEE
15 years 4 months ago
A binary Particle Swarm Optimization approach to fault diagnosis in parallel and distributed systems
— The efficient diagnosis of hardware and software faults in parallel and distributed systems remains a challenge in today’s most prolific decentralized environments. System-...
Rafael Falcón, Marcio Almeida, Amiya Nayak
IAJIT
2010
177views more  IAJIT 2010»
15 years 3 months ago
Representing Uncertainty in Medical Knowledge: An Interval Based Approach for Binary Fuzzy Relations
: This paper addresses issues involved in representation of causal relationships between medical categories. An interval based approach for medical binary fuzzy relations is propos...
Bassam Haddad, Ahmad Awwad
MMMACNS
2010
Springer
15 years 3 months ago
Symptoms-Based Detection of Bot Processes
Botnets have become the most powerful tool for attackers to victimize countless users across cyberspace. Previous work on botnet detection has mainly focused on identifying infecte...
Jose Andre Morales, Erhan J. Kartaltepe, Shouhuai ...
SCP
2010
78views more  SCP 2010»
15 years 3 months ago
Scoping strategies for distributed aspects
Dynamic deployment of aspects brings greater flexibility and reuse potential, but requires a proper means for scoping aspects. Scoping issues are particularly crucial in a distri...
Éric Tanter, Johan Fabry, Rémi Douen...
« Prev « First page 1624 / 1881 Last » Next »