Sciweavers

3651 search results - page 119 / 731
» Data Mining for Security Applications
Sort
View
CSREASAM
2006
15 years 6 months ago
A New Approach For Source Authentication Of Multicast Data
Multicast Security is one of the important problems to solve for the successful deployment of group communication applications, and source authentication of multicast data is a key...
Jinxin He, Gaochao Xu, Zhiguo Zhou, Guannan Gong
131
Voted
IEEEARES
2007
IEEE
15 years 11 months ago
Reliability Markov Chains for Security Data Transmitter Analysis
Security communication systems composed of highly reliable components may have few if any failures while undergoing heavy testing or field-usage. This paper combines (i) analysis ...
Calin Ciufudean, Bianca Satco, Constantin Filote
ERSA
2009
109views Hardware» more  ERSA 2009»
15 years 2 months ago
An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring da...
Austin Rogers, Aleksandar Milenkovic
157
Voted
BIODATAMINING
2008
178views more  BIODATAMINING 2008»
15 years 5 months ago
Clustering-based approaches to SAGE data mining
Serial analysis of gene expression (SAGE) is one of the most powerful tools for global gene expression profiling. It has led to several biological discoveries and biomedical appli...
Haiying Wang, Huiru Zheng, Francisco Azuaje
136
Voted
IADIS
2008
15 years 6 months ago
Arch: Data Integration Framework Based on Rdfa and Usability Aspects
Lots of work has already been published on developing applications for schema or ontology matching. Most of these approaches do not take the usability aspect into account. This pa...
Christiane Dominovic