Sciweavers

2143 search results - page 363 / 429
» corr 2010
Sort
View
90
Voted
CORR
2010
Springer
102views Education» more  CORR 2010»
15 years 22 days ago
Detecting Weak but Hierarchically-Structured Patterns in Networks
The ability to detect weak distributed activation patterns in networks is critical to several applications, such as identifying the onset of anomalous activity or incipient conges...
Aarti Singh, Robert D. Nowak, A. Robert Calderbank
93
Voted
CORR
2010
Springer
140views Education» more  CORR 2010»
15 years 22 days ago
An HTTP-Based Versioning Mechanism for Linked Data
Dereferencing a URI returns a representation of the current state of the resource identified by that URI. But, on the Web representations of prior states of a resource are also av...
Herbert Van de Sompel, Robert Sanderson, Michael L...
78
Voted
CORR
2010
Springer
54views Education» more  CORR 2010»
15 years 22 days ago
Development of a Cargo Screening Process Simulator: A First Approach
The efficiency of current cargo screening processes at sea and air ports is largely unknown as few benchmarks exists against which they could be measured. Some manufacturers provi...
Peer-Olaf Siebers, Galina Sherman, Uwe Aickelin
CORR
2010
Springer
112views Education» more  CORR 2010»
15 years 22 days ago
Data security in mobile devices by geo locking
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and ...
M. Prabu Kumar, K. Praneesh Kumar Yadav
78
Voted
CORR
2010
Springer
139views Education» more  CORR 2010»
15 years 22 days ago
Compromising Tor Anonymity Exploiting P2P Information Leakage
Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war be...
Pere Manils, Chaabane Abdelberri, Stevens Le-Blond...