Sciweavers

1599 search results - page 247 / 320
» Program Analysis for Security and Privacy
Sort
View
PAISI
2010
Springer
15 years 1 months ago
Identifying Controversial Issues and Their Sub-topics in News Articles
We tackle the problem of automatically detecting controversial issues and their subtopics from news articles. We define a controversial issue as a concept that invokes conflicting ...
Yoonjung Choi, Yuchul Jung, Sung-Hyon Myaeng
ISI
2008
Springer
14 years 12 months ago
Using "Cited by" Information to Find the Context of Research Papers
This paper proposes a novel method of analyzing data to find important information about the context of research papers. The proposed CCTVA (Collecting, Cleaning, Translating, Visu...
Chun-Hung Lu, Chih-Chien Wang, Min-Yuh Day, Chorng...
ISI
2006
Springer
14 years 12 months ago
Visualizing Authorship for Identification
As a result of growing misuse of online anonymity, researchers have begun to create visualization tools to facilitate greater user accountability in online communities. In this stu...
Ahmed Abbasi, Hsinchun Chen
SP
2002
IEEE
14 years 11 months ago
VLAM-G: A Grid-based virtual laboratory
The Grid-based Virtual Laboratory AMsterdam (VLAM-G), provides a science portal for distributed analysis in applied scientific research. It offers scientists experiment control, d...
Hamideh Afsarmanesh, Robert G. Belleman, Adam Bell...
ESORICS
2010
Springer
14 years 10 months ago
Speaker Recognition in Encrypted Voice Streams
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
Michael Backes, Goran Doychev, Markus Dürmuth...