Sciweavers

SOCIALCOM
2010
14 years 10 months ago
A Multi-factor Approach to Securing Software on Client Computing Platforms
Protecting the integrity of software platforms, especially in unmanaged consumer computing systems is a difficult problem. Attackers may attempt to execute buffer overflow attacks ...
Raghunathan Srinivasan, Vivek Iyer, Amit Kanitkar,...
142
Voted
SOCIALCOM
2010
14 years 10 months ago
Incentive Compatible Distributed Data Mining
Abstract--In this paper, we propose a game-theoretic mechanism to encourage truthful data sharing for distributed data mining. Our proposed mechanism uses the classic VickreyClarke...
Murat Kantarcioglu, Robert Nix
162
Voted
RFIDSEC
2010
14 years 10 months ago
EC-RAC: Enriching a Capacious RFID Attack Collection
Abstract. We demonstrate two classes of attacks on EC-RAC, a growing set of RFID protocols. Our first class of attacks concerns the compositional approach used to construct a parti...
Ton van Deursen, Sasa Radomirovic
126
Voted
MSOM
2010
65views more  MSOM 2010»
14 years 10 months ago
The Optimal Composition of Influenza Vaccines Subject to Random Production Yields
The Vaccine and Related Biologic Products Advisory Committee meets at least once a year to decide the composition of the influenza vaccine in the U.S. Past evidence suggests that ...
Soo-Haeng Cho
109
Voted
MSOM
2010
78views more  MSOM 2010»
14 years 10 months ago
Coordination of Outsourced Operations to Minimize Weighted Flow Time and Capacity Booking Costs
Tolga Aydinliyim, George L. Vairaktarakis
93
Voted
MSCS
2010
59views more  MSCS 2010»
14 years 10 months ago
Observing the superposition of a single particle with the vacuum
Luis Manuel Rico Gutierrez, Veiko Palge, Jacob Dun...
95
Voted
MSCS
2010
73views more  MSCS 2010»
14 years 10 months ago
Modal and mixed specifications: key decision problems and their complexities
Adam Antonik, Michael Huth, Kim G. Larsen, Ulrik N...
88
Voted
MSCS
2010
86views more  MSCS 2010»
14 years 10 months ago
De Groot duality and models of choice: angels, demons and nature
Jean Goubault-Larrecq
125
Voted
MR
2010
219views Robotics» more  MR 2010»
14 years 10 months ago
Applications of TEM imaging, analysis and electron holography to III-nitride HEMT devices
David J. Smith, David A. Cullen, Lin Zhou, Martha ...
141
Voted
MP
2010
163views more  MP 2010»
14 years 10 months ago
Speeding up IP-based algorithms for constrained quadratic 0-1 optimization
In many practical applications, the task is to optimize a non-linear objective function over the vertices of a well-studied polytope as, e.g., the matching polytope or the travelli...
Christoph Buchheim, Frauke Liers, Marcus Oswald