Sciweavers

5254 search results - page 820 / 1051
» The Evaluation of Courses in Information Systems
Sort
View
TKDE
2008
122views more  TKDE 2008»
15 years 1 months ago
Protection of Database Security via Collaborative Inference Detection
Malicious users can exploit the correlation among data to infer sensitive information from a series of seemingly innocuous data accesses. Thus, we develop an inference violation d...
Yu Chen, Wesley W. Chu
BMCBI
2005
134views more  BMCBI 2005»
15 years 1 months ago
Inherited disorder phenotypes: controlled annotation and statistical analysis for knowledge mining from gene lists
Background: Analysis of inherited diseases and their associated phenotypes is of great importance to gain knowledge of underlying genetic interactions and could ultimately give cl...
Marco Masseroli, Osvaldo Galati, Mauro Manzotti, K...
103
Voted
TWC
2008
116views more  TWC 2008»
15 years 1 months ago
The performance of multi-user cooperative diversity in an asynchronous CDMA uplink
Abstract--This paper investigates the impact of interuser non-orthogonality and asynchronous communication on the information-outage probability performance of multi-user decode-an...
Kanchan G. Vardhe, Daryl Reynolds, Matthew C. Vale...
175
Voted
JNSM
2002
218views more  JNSM 2002»
15 years 1 months ago
An Agent-based Connection Management Protocol for Ad Hoc Wireless Networks
Realizing high volume of data transmission in real time communication in a highly dynamic architecture like Mobile Ad hoc Networks (MANET) still remains a major point of research....
Romit Roy Choudhury, Krishna Paul, Somprakash Band...
90
Voted
CHI
2009
ACM
16 years 2 months ago
A comprehensive study of frequency, interference, and training of multiple graphical passwords
Graphical password systems have received significant attention as one potential solution to the need for more usable authentication, but nearly all prior work makes the unrealisti...
Katherine Everitt, Tanya Bragin, James Fogarty, Ta...