Sciweavers

110 search results - page 13 / 22
» Data degradation: making private data less sensitive over ti...
Sort
View
PERCOM
2011
ACM
14 years 1 months ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
KDD
2001
ACM
216views Data Mining» more  KDD 2001»
15 years 10 months ago
The distributed boosting algorithm
In this paper, we propose a general framework for distributed boosting intended for efficient integrating specialized classifiers learned over very large and distributed homogeneo...
Aleksandar Lazarevic, Zoran Obradovic
COMCOM
2008
84views more  COMCOM 2008»
14 years 9 months ago
SecureStream: An intrusion-tolerant protocol for live-streaming dissemination
Peer-to-peer (P2P) dissemination systems are vulnerable to attacks that may impede nodes from receiving data in which they are interested. The same properties that lead P2P system...
Maya Haridasan, Robbert van Renesse
OPODIS
2004
14 years 11 months ago
Firewall Queries
Firewalls are crucial elements in network security, and have been widely deployed in most businesses and institutions for securing private networks. The function of a firewall is t...
Alex X. Liu, Mohamed G. Gouda, Huibo H. Ma, Anne H...
BMCBI
2011
14 years 4 months ago
A Platform for Processing Expression of Short Time Series (PESTS)
Background: Time course microarray profiles examine the expression of genes over a time domain. They are necessary in order to determine the complete set of genes that are dynamic...
Anshu Sinha, Marianthi Markatou