Sciweavers

2452 search results - page 101 / 491
» The Case for Precision Sharing
Sort
View
SIGMETRICS
2003
ACM
136views Hardware» more  SIGMETRICS 2003»
15 years 5 months ago
Internet intrusions: global characteristics and prevalence
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the glob...
Vinod Yegneswaran, Paul Barford, Johannes Ullrich
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
15 years 4 months ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...
ECAI
2008
Springer
15 years 1 months ago
Privacy-Preserving Query Answering in Logic-based Information Systems
Abstract. We study privacy guarantees for the owner of an information system who wants to share some of the information in the system with clients while keeping some other informat...
Bernardo Cuenca Grau, Ian Horrocks
BMCBI
2005
104views more  BMCBI 2005»
14 years 11 months ago
A statistical approach for array CGH data analysis
Background: Microarray-CGH experiments are used to detect and map chromosomal imbalances, by hybridizing targets of genomic DNA from a test and a reference sample to sequences imm...
Franck Picard, Stéphane Robin, Marc Laviell...
98
Voted
KDD
2012
ACM
179views Data Mining» more  KDD 2012»
13 years 2 months ago
Transparent user models for personalization
Personalization is a ubiquitous phenomenon in our daily online experience. While such technology is critical for helping us combat the overload of information we face, in many cas...
Khalid El-Arini, Ulrich Paquet, Ralf Herbrich, Jur...