Sciweavers

151 search results - page 16 / 31
» his 2009
Sort
View
CSE
2009
IEEE
15 years 1 months ago
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing
A user stores his personal files in a cloud, and retrieves them wherever and whenever he wants. For the sake of protecting the user data privacy and the user queries privacy, a use...
Qin Liu, Guojun Wang, Jie Wu
100
Voted
CSE
2009
IEEE
15 years 1 months ago
Churn Prediction in MMORPGs: A Social Influence Based Approach
Massively Multiplayer Online Role Playing Games (MMORPGs) are computer based games in which players interact with one another in the virtual world. Worldwide revenues for MMORPGs h...
Jaya Kawale, Aditya Pal, Jaideep Srivastava
ICN
2009
Springer
15 years 4 months ago
An Automotive Security System for Anti-theft
— Automotive theft has been a persisting problem around the world and greater challenge comes from professional thieves. In this paper, we present an automotive security system t...
Huaqun Guo, H. S. Cheng, Yong Dong Wu, J. J. Ang, ...
ESORICS
2009
Springer
15 years 10 months ago
Data Structures with Unpredictable Timing
Abstract. A range of attacks on network components, such as algorithmic denial-of-service attacks and cryptanalysis via timing attacks, are enabled by data structures for which an ...
Darrell Bethea, Michael K. Reiter
IDEAL
2009
Springer
14 years 7 months ago
Implementation and Integration of Algorithms into the KEEL Data-Mining Software Tool
This work is related to the KEEL1 (Knowledge Extraction based on Evolutionary Learning) tool, a non-commercial software that supports data management, design of experiments and an ...
Alberto Fernández, Julián Luengo, Jo...