Sciweavers

405 search results - page 39 / 81
» Intermediated technology use in developing communities
Sort
View
EIT
2008
IEEE
14 years 11 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
SIGKDD
2010
126views more  SIGKDD 2010»
14 years 4 months ago
MultiClust 2010: discovering, summarizing and using multiple clusterings
Traditional clustering focuses on finding a single best clustering solution from data. However, given a single data set, one could interpret it in different ways. This is particul...
Xiaoli Z. Fern, Ian Davidson, Jennifer G. Dy
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
14 years 8 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...
ICSOC
2005
Springer
15 years 3 months ago
Speaking a Common Language: A Conceptual Model for Describing Service-Oriented Systems
The diffusion of service-oriented computing is today heavily influencing many software development and research activities. Despite this, service-oriented computing is a relative...
Massimiliano Colombo, Elisabetta Di Nitto, Massimi...
ECR
2010
112views more  ECR 2010»
14 years 9 months ago
TREET: the Trust and Reputation Experimentation and Evaluation Testbed
Abstract To date, trust and reputation systems have often been evaluated using methods of their designers' own devising. Recently, we demonstrated that a number of noteworthy ...
Reid Kerr, Robin Cohen