Sciweavers

24188 search results - page 202 / 4838
» Computing on Encrypted Data
Sort
View
ICWS
2004
IEEE
15 years 4 months ago
Best-Practice Patterns and Tool Support for Configuring Secure Web Services Messaging
This paper presents an emerging tool for security configuration of service-oriented architectures with Web Services. Security is a major concern when implementing mission-critical...
Michiaki Tatsubori, Takeshi Imamura, Yuhichi Nakam...
JCP
2007
148views more  JCP 2007»
15 years 3 months ago
P3ARM-t: Privacy-Preserving Protocol for Association Rule Mining with t Collusion Resistance
— The ability to mine large volumes of distributed datasets enables more precise decision making. However, privacy concerns should be carefully addressed when mining datasets dis...
Iman Saleh, Mohamed Eltoweissy
120
Voted
CNSM
2010
15 years 1 months ago
An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype
The classification of encrypted traffic on the fly from network traces represents a particularly challenging application domain. Recent advances in machine learning provide the opp...
Riyad Alshammari, A. Nur Zincir-Heywood
MUE
2008
IEEE
173views Multimedia» more  MUE 2008»
15 years 9 months ago
Efficient Data Dissemination in Mobile P2P Ad-Hoc Networks for Ubiquitous Computing
In this paper we propose Rank-Based Broadcast (RBB) algorithm using High Order Markov Chain (HOMC) with weight values in mobile p2p ad-hoc networks (MOPNET) for ubiquitous. RBB us...
Do-Hoon Kim, Myoung Rak Lee, Longzhe Han, Hoh Pete...
OOIS
2001
Springer
15 years 7 months ago
Analysis of Software Engineering Data Using Computational Intelligence Techniques
The accurate estimation of software development effort has major implications for the management of software development in the industry. Underestimates lead to time pressures tha...
Gabriel Jarillo, Giancarlo Succi, Witold Pedrycz, ...