Sciweavers

481 search results - page 16 / 97
» Some Problems in Sanitizing Network Data
Sort
View
ESA
2007
Springer
105views Algorithms» more  ESA 2007»
15 years 1 months ago
Finding Mobile Data: Efficiency vs. Location Inaccuracy
A token is hidden in one out of n boxes following some known probability distribution and then all the boxes are locked. The goal of a searcher is to find the token in at most D n...
Amotz Bar-Noy, Joanna Klukowska
88
Voted
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
15 years 3 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
62
Voted
ICNS
2008
IEEE
15 years 4 months ago
Reliable Evidence of Data Integrity from an Untrusted Storage Service
Digital storage demand is growing with the increasing use of digital artifacts from media files to business documents. Regulatory frameworks ask for unaltered, durable storage of...
Claudius Stern, Philipp Adelt, Volker Krummel, Mar...
91
Voted
IJAR
2010
152views more  IJAR 2010»
14 years 8 months ago
Structural-EM for learning PDG models from incomplete data
Probabilistic Decision Graphs (PDGs) are a class of graphical models that can naturally encode some context specific independencies that cannot always be efficiently captured by...
Jens D. Nielsen, Rafael Rumí, Antonio Salme...
CORR
2011
Springer
243views Education» more  CORR 2011»
14 years 4 months ago
Distributed Estimation and False Data Detection with Application to Power Networks
This work presents a distributed method for control centers in a power network to estimate the operating condition of the power plant, and to ultimately determine the occurrence o...
Fabio Pasqualetti, Ruggero Carli, Francesco Bullo