Sciweavers

24529 search results - page 400 / 4906
» Computing on Authenticated Data
Sort
View
STOC
2003
ACM
133views Algorithms» more  STOC 2003»
16 years 5 months ago
A fast algorithm for computing steiner edge connectivity
Given an undirected graph or an Eulerian directed graph G and a subset S of its vertices, we show how to determine the edge connectivity C of the vertices in S in time O(C3 n log ...
Richard Cole, Ramesh Hariharan
158
Voted
PERCOM
2006
ACM
16 years 4 months ago
Is Your Cat Infected with a Computer Virus?
RFID systems as a whole are often treated with suspicion, but the input data received from individual RFID tags is implicitly trusted. RFID attacks are currently conceived as prop...
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
ICDM
2009
IEEE
167views Data Mining» more  ICDM 2009»
15 years 11 months ago
A Framework for Computing the Privacy Scores of Users in Online Social Networks
—A large body of work has been devoted to address corporate-scale privacy concerns related to social networks. The main focus was on how to share social networks owned by organiz...
Kun Liu, Evimaria Terzi
ICDM
2006
IEEE
155views Data Mining» more  ICDM 2006»
15 years 10 months ago
Automatic Single-Organ Segmentation in Computed Tomography Images
In this paper, we propose a hybrid approach for automatic single-organ segmentation in Computed Tomography (CT) data. The approach consists of three stages: first, a probability i...
Ruchaneewan Susomboon, Daniela Stan Raicu, Jacob D...
CSB
2005
IEEE
136views Bioinformatics» more  CSB 2005»
15 years 10 months ago
Computational Method for Temporal Pattern Discovery in Biomedical Genomic Databases
With the rapid growth of biomedical research databases, opportunities for scientific inquiry have expanded quickly and led to a demand for computational methods that can extract b...
Mohammed I. Rafiq, Martin J. O'Connor, Amar K. Das