Sciweavers

1173 search results - page 78 / 235
» Identifying Successful Telecommuters
Sort
View
144
Voted
AAAI
2007
15 years 7 months ago
Adaptive Traitor Tracing with Bayesian Networks
The practical success of broadcast encryption hinges on the ability to (1) revoke the access of compromised keys and (2) determine which keys have been compromised. In this work w...
Philip Zigoris, Hongxia Jin
NSDI
2008
15 years 7 months ago
Characterizing Botnets from Email Spam Records
We develop new techniques to map botnet membership using traces of spam email. To group bots into botnets we look for multiple bots participating in the same spam email campaign. ...
Li Zhuang, John Dunagan, Daniel R. Simon, Helen J....
AIRS
2008
Springer
15 years 7 months ago
Efficient Feature Selection in the Presence of Outliers and Noises
Although regarded as one of the most successful algorithm to identify predictive features, Relief is quite vulnerable to outliers and noisy features. The recently proposed I-Relief...
Shuang-Hong Yang, Bao-Gang Hu
ANCS
2008
ACM
15 years 7 months ago
Data path credentials for high-performance capabilities-based networks
Capabilities-based networks present a fundamental shift in the security design of network architectures. Instead of permitting the transmission of packets from any source to any d...
Tilman Wolf
ISLPED
2007
ACM
132views Hardware» more  ISLPED 2007»
15 years 6 months ago
Thermal response to DVFS: analysis with an Intel Pentium M
Increasing power density in computing systems from laptops to servers has spurred interest in dynamic thermal management. Based on the success of dynamic voltage and frequency sca...
Heather Hanson, Stephen W. Keckler, Soraya Ghiasi,...