Sciweavers

698 search results - page 69 / 140
» Evaluating Key Statements Analysis
Sort
View
144
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
Supporting Secure Communication and Data Collection in Mobile Sensor Networks
— Sensor deployments may be static, but researchers have recently been making a case for mobile collector nodes to enhance data acquisition. Since mobile nodes are often more pri...
Li Zhou, Jinfeng Ni, Chinya V. Ravishankar
138
Voted
CHI
2010
ACM
15 years 10 months ago
Gender demographic targeting in sponsored search
In this research, we evaluate the effect of gender in analyzing the performance of sponsored search advertising. We examine a log file with data comprised of nearly 7,000,000 reco...
Bernard J. Jansen, Lauren Solomon
153
Voted
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
15 years 7 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
113
Voted
NSDI
2007
15 years 6 months ago
Information Slicing: Anonymity Using Unreliable Overlays
This paper proposes a new approach to anonymous communication called information slicing. Typically, anonymizers use onion routing, where a message is encrypted in layers with the...
Sachin Katti, Jeff Cohen, Dina Katabi
137
Voted
TWC
2008
156views more  TWC 2008»
15 years 3 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou