Sciweavers

881 search results - page 121 / 177
» Secure Personal Data Servers: a Vision Paper
Sort
View
KDD
2010
ACM
197views Data Mining» more  KDD 2010»
14 years 11 months ago
Semi-supervised feature selection for graph classification
The problem of graph classification has attracted great interest in the last decade. Current research on graph classification assumes the existence of large amounts of labeled tra...
Xiangnan Kong, Philip S. Yu
118
Voted
ESORICS
2009
Springer
15 years 8 months ago
A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem
Abstract. Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy...
Ileana Buhan, Jeroen Breebaart, Jorge Guajardo, Ko...
CCS
2009
ACM
15 years 5 months ago
Filter-resistant code injection on ARM
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...
SIGMOD
2010
ACM
250views Database» more  SIGMOD 2010»
15 years 6 months ago
Spreadsheet as a relational database engine
Spreadsheets are among the most commonly used applications for data management and analysis. Perhaps they are even among the most widely used computer applications of all kinds. H...
Jerzy Tyszkiewicz
EDBT
2011
ACM
225views Database» more  EDBT 2011»
14 years 5 months ago
SeMiTri: a framework for semantic annotation of heterogeneous trajectories
GPS devices allow recording the movement track of the moving object they are attached to. This data typically consists of a stream of spatio-temporal (x,y,t) points. For applicati...
Zhixian Yan, Dipanjan Chakraborty, Christine Paren...