Sciweavers

1294 search results - page 139 / 259
» Privacy and Data Mining: New Developments and Challenges
Sort
View
IDA
2008
Springer
14 years 9 months ago
ExpertDiscovery system application for the hierarchical analysis of eukaryotic transcription regulatory regions based on DNA cod
We developed Relational Data Mining approach which allows to overcome essential limitations of the Data Mining and Knowledge Discovery techniques. In the paper the approach was im...
I. V. Khomicheva, Eugenii E. Vityaev, Elena A. Ana...
SEC
2007
14 years 11 months ago
Building a Distributed Semantic-aware Security Architecture
Enhancing the service-oriented architecture paradigm with semantic components is a new field of research and goal of many ongoing projects. The results lead to more powerful web a...
Jan Kolter, Rolf Schillinger, Günther Pernul
ESORICS
2010
Springer
14 years 11 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
CCS
2010
ACM
14 years 8 months ago
Platform-independent programs
Given a single program (i.e., bit string), one may assume that the program's behaviors can be determined by first identifying the native runtime architecture and then executi...
Sang Kil Cha, Brian Pak, David Brumley, Richard Ja...
P2P
2009
IEEE
155views Communications» more  P2P 2009»
15 years 4 months ago
ModelNet: Towards a DataCenter Emulation Environment
—ModelNet is a network emulator designed for repeatable, large-scale experimentation with real networked systems. This talk introduces the ideas behind ModelNet that have made it...
Kashi Venkatesh Vishwanath, Amin Vahdat, Ken Yocum...