Sciweavers

2429 search results - page 276 / 486
» Using Aspects to Design a Secure System
Sort
View
WISEC
2009
ACM
15 years 10 months ago
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru
JUCS
2008
187views more  JUCS 2008»
15 years 3 months ago
Semantic Information in Medical Information Systems: Utilization of Text Mining Techniques to Analyze Medical Diagnoses
: Most information in Hospitals is still only available in text format and the amount of this data is immensely increasing. Consequently, text mining is an essential area of medica...
Andreas Holzinger, Regina Geierhofer, Felix Mö...
IDTRUST
2010
ACM
15 years 8 months ago
Federated login to TeraGrid
We present a new federated login capability for the TeraGrid, currently the world’s largest and most comprehensive distributed cyberinfrastructure for open scientific research....
Jim Basney, Terry Fleury, Von Welch
CCS
2010
ACM
15 years 2 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
NETWORKING
2010
15 years 4 months ago
Measurement Study of Multi-party Video Conferencing
Abstract. More and more free multi-party video conferencing applications are readily available over the Internet and both Server-to-Client (S/C) or Peer-to-Peer (P2P) technologies ...
Yue Lu, Yong Zhao, Fernando A. Kuipers, Piet Van M...