Sciweavers

3544 search results - page 419 / 709
» Information Security in Open Systems
Sort
View
CASES
2010
ACM
14 years 10 months ago
Improving the quality of ring oscillator PUFs on FPGAs
Physical Unclonable Functions (PUFs) based on Ring Oscillators (ROs) are a promising primitive for FPGA security. However, the quality of their implementation depends on several d...
Dominik Merli, Frederic Stumpf, Claudia Eckert
KDD
2005
ACM
109views Data Mining» more  KDD 2005»
16 years 7 days ago
A new scheme on privacy-preserving data classification
We address privacy-preserving classification problem in a distributed system. Randomization has been the approach proposed to preserve privacy in such scenario. However, this appr...
Nan Zhang 0004, Shengquan Wang, Wei Zhao
EKAW
2010
Springer
14 years 10 months ago
Scaling Up Question-Answering to Linked Data
Linked Data semantic sources, in particular DBpedia, can be used to answer many user queries. PowerAqua is an open multi-ontology Question Answering (QA) system for the Semantic We...
Vanessa Lopez, Andriy Nikolov, Marta Sabou, Victor...
SACMAT
2011
ACM
14 years 2 months ago
Modeling data flow in socio-information networks: a risk estimation approach
Information leakage via the networks formed by subjects (e.g., Facebook, Twitter) and objects (e.g., blogosphere) − some of whom may be controlled by malicious insiders − ofte...
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling...
ICSM
2009
IEEE
15 years 6 months ago
Predicting change impact from logical models
To improve the ability of predicting the impact scope of a given change, we present two approaches applicable to the maintenance of object-oriented software systems. Our first ap...
Sunny Wong, Yuanfang Cai