Sciweavers

24188 search results - page 246 / 4838
» Computing on Encrypted Data
Sort
View
145
Voted
DIMVA
2011
14 years 7 months ago
Timing Attacks on PIN Input in VoIP Networks (Short Paper)
To access automated voice services, Voice over IP (VoIP) users sometimes are required to provide their Personal Identification Numbers (PIN) for authentication. Therefore when the...
Ge Zhang, Simone Fischer-Hübner
159
Voted
SIGMOD
2003
ACM
162views Database» more  SIGMOD 2003»
16 years 3 months ago
DBGlobe: a service-oriented P2P system for global computing
The challenge of peer-to-peer computing goes beyond simple file sharing. In the DBGlobe project, we view the multitude of peers carrying data and services as a superdatabase. Our ...
Evaggelia Pitoura, Serge Abiteboul, Dieter Pfoser,...
118
Voted
KDD
1998
ACM
200views Data Mining» more  KDD 1998»
15 years 7 months ago
Fast Computation of 2-Dimensional Depth Contours
"Oneperson's noise is another person's signal." For manyapplications, including the detection of credit card frauds and the monitoringof criminal activities in...
Theodore Johnson, Ivy Kwok, Raymond T. Ng
115
Voted
JMLR
2010
177views more  JMLR 2010»
14 years 10 months ago
Multitask Learning for Brain-Computer Interfaces
Brain-computer interfaces (BCIs) are limited in their applicability in everyday settings by the current necessity to record subjectspecific calibration data prior to actual use of...
Morteza Alamgir, Moritz Grosse-Wentrup, Yasemin Al...
85
Voted
KDD
2003
ACM
111views Data Mining» more  KDD 2003»
16 years 4 months ago
Critical event prediction for proactive management in large-scale computer clusters
Adam J. Oliner, Anand Sivasubramaniam, Irina Rish,...