Search concepts
|
Selected Filters
|
- 129,450 - 129,500 out of 147,498 results
Search results
-
Conference contribution
Secure mediated databases
Candan, K., Jajodia, S. & Subrahmanian, V. S., 1996, Proceedings - International Conference on Data Engineering. Los Alamitos, CA, United States: IEEE, p. 28-37 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
22 Scopus citations -
Secure multidimensional range queries in sensor networks
Zhang, R., Shi, J. & Zhang, Y., 2009, MobiHoc'09 - Proceedings of the 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing. p. 197-206 10 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
45 Scopus citations -
Secure multi-path DATA deliver in sensor networks
Huang, D., Dec 1 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference. 5379954. (Proceedings - IEEE Military Communications Conference MILCOM).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Secure outsourced skyline query processing via untrusted cloud service providers
Chen, W., Liu, M., Zhang, R., Zhang, Y. & Liu, S., Jul 27 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., 7524509. (Proceedings - IEEE INFOCOM; vol. 2016-July).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
26 Scopus citations -
Secure Outsourced Top-k Selection Queries against Untrusted Cloud Service Providers
Yu, X., Hu, Y., Zhang, R., Yan, Z. & Zhang, Y., Jun 25 2021, 2021 IEEE/ACM 29th International Symposium on Quality of Service, IWQOS 2021. Institute of Electrical and Electronics Engineers Inc., (2021 IEEE/ACM 29th International Symposium on Quality of Service, IWQOS 2021).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Scopus citations -
SECURE QUERY PROCESSING USING AI TECHNIQUES.
Thuraisingham, M. B., Tsai, W. T. & Keefe, T. F., Jan 1 1988, Proceedings of the Hawaii International Conference on System Science. IEEE, p. 561-570 10 p. (Proceedings of the Hawaii International Conference on System Science).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
5 Scopus citations -
Secure range queries in tiered sensor networks
Shi, J., Zhang, R. & Zhang, Y., 2009, IEEE INFOCOM 2009 - The 28th Conference on Computer Communications. p. 945-953 9 p. 5062005. (Proceedings - IEEE INFOCOM).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
81 Scopus citations -
Secure RSS-fingerprint-based indoor positioning: Attacks and countermeasures
Yuan, L., Hu, Y., Li, Y., Zhang, R., Zhang, Y. & Hedgpeth, T., Aug 10 2018, 2018 IEEE Conference on Communications and Network Security, CNS 2018. Institute of Electrical and Electronics Engineers Inc., 8433131. (2018 IEEE Conference on Communications and Network Security, CNS 2018).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
7 Scopus citations -
Secure sharing of electronic health records in clouds
Wu, R., Ahn, G-J. & Hu, H., 2012, CollaborateCom 2012 - Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing. p. 711-718 8 p. 6450972. (CollaborateCom 2012 - Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
77 Scopus citations -
Secure the internet, one home at a time
Xu, K., Wang, F. & Jia, X., 2015, 2015 IEEE Global Communications Conference, GLOBECOM 2015. Institute of Electrical and Electronics Engineers Inc., 7417086. (2015 IEEE Global Communications Conference, GLOBECOM 2015).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Secure top-k query processing via untrusted location-based service providers
Zhang, R., Zhang, Y. & Zhang, C., 2012, 2012 Proceedings IEEE INFOCOM, INFOCOM 2012. p. 1170-1178 9 p. 6195476. (Proceedings - IEEE INFOCOM).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
33 Scopus citations -
Secure web referral service
Nagarajan, V. & Huang, D., May 11 2012, International Conference on Information Networking 2012, ICOIN 2012 - Conference Program. p. 53-58 6 p. 6164348. (International Conference on Information Networking).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Scopus citations -
Secure web referral services for mobile cloud computing
Xu, L., Li, L., Nagarajan, V., Huang, D. & Tsai, W. T., Aug 5 2013, Proceedings - 2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013. p. 584-593 10 p. 6525579. (Proceedings - 2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
9 Scopus citations -
Secure wireless communications via cooperative relaying and jamming
Tang, L., Gong, X., Wu, J. & Zhang, J., Dec 1 2011, 2011 IEEE GLOBECOM Workshops, GC Wkshps 2011. p. 849-853 5 p. 6162575. (2011 IEEE GLOBECOM Workshops, GC Wkshps 2011).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
26 Scopus citations -
Secure wireless gateway
Godber, A. & Dasgupta, P., 2002, Proceedings of the Workshop on Wireless Security. Association for Computing Machinery (ACM), p. 41-46 6 p. (Proceedings of the Workshop on Wireless Security).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
18 Scopus citations -
Securing cyberspace: Identifying key actors in hacker communities
Benjamin, V. & Chen, H., 2012, ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities. p. 24-29 6 p. 6283296. (ISI 2012 - 2012 IEEE International Conference on Intelligence and Security Informatics: Cyberspace, Border, and Immigration Securities).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
56 Scopus citations -
Securing dynamic spectrum use
Cui, M., Syrotiuk, V. & Colbourn, C., 2004, IEEE Vehicular Technology Conference. 2 ed. Vol. 60. p. 1153-1157 5 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Securing knowledge assets and processes: Lessons from the defense and intelligence sectors
Desouza, K. C. & Vanapalli, G. K., 2005, Proceedings of the Annual Hawaii International Conference on System Sciences. Spraque, Jr., R. H. (ed.). p. 27 1 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
6 Scopus citations -
Securing P2P networks using peer reputations: Is there a silver bullet?
Dewan, P. & Dasgupta, P., Dec 1 2005, 2005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005. p. 30-36 7 p. 1405139. (2005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005; vol. 2005).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
31 Scopus citations -
Securing reputation data in peer-to-peer networks
Dewan, P. & Dasgupta, P., 2004, Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems. Gonzalez, T. (ed.). Vol. 16. p. 485-490 6 p. 439-039Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
20 Scopus citations -
Securing resource-constrained wireless ad hoc networks
Fang, Y. & Zhang, Y., 2007, 2007 IEEE Sarnoff Symposium, SARNOFF. 4567365. (2007 IEEE Sarnoff Symposium, SARNOFF).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Scopus citations -
Securing sensor networks with location-based keys
Zhang, Y., Liu, W., Lou, W. & Fang, Y., 2005, 2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wireless for the Masses - Ready for Take-off. p. 1909-1914 6 p. NET30-1. (IEEE Wireless Communications and Networking Conference, WCNC; vol. 4).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
70 Scopus citations -
Securing social media user data - An adversarial approach
Beigi, G., Shu, K., Zhang, Y. & Liu, H., Jul 3 2018, HT 2018 - Proceedings of the 29th ACM Conference on Hypertext and Social Media. Association for Computing Machinery, Inc, p. 165-173 9 p. (HT 2018 - Proceedings of the 29th ACM Conference on Hypertext and Social Media).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
17 Scopus citations -
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem
Kim, D., Cho, H., Kwon, Y., Doupé, A., Son, S., Ahn, G. J. & Dumitras, T., May 24 2021, ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 407-420 14 p. (ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Scopus citations -
Security assessment of the year 2020 planned Western Interconnection
Quintero, J., Vittal, V., Heydt, G. T., Zhang, H. & Nickell, B., Dec 1 2013, 2013 IEEE Power and Energy Society General Meeting, PES 2013. 6672219. (IEEE Power and Energy Society General Meeting).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Scopus citations -
Security Concerns and Citizens’ Privacy Implications in Smart Multimedia Applications
Mimo, E. M. & McDaniel, T., 2022, Smart Multimedia - Third International Conference, ICSM 2022, Revised Selected Papers. Berretti, S. & Su, G-M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 107-115 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13497 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Security considerations for distributed Web-based e-commerce applications in Java
Lindquist, T., 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, HICSS 2002. Sprague, R. H. (ed.). IEEE Computer Society, p. 5 1 p. 994193. (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 2002-January).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Scopus citations -
Security for pervasive health monitoring sensor applications
Venkatasubramanian, K. K. & Gupta, S., 2006, Proceedings - 4th International Conference on Intelligent Sensing and Information Processing, ICISIP 2006. p. 197-202 6 p. 4286096. (Proceedings - 4th International Conference on Intelligent Sensing and Information Processing, ICISIP 2006).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
69 Scopus citations -
Security model consistency in secure object-oriented systems
Keefe, T. F. & Tsai, W. T., Dec 1 1989, Fifth Annu Comput Secur Appl Conf. Anon (ed.). Publ by IEEE, p. 290-298 9 p. (Annual Computer Security Applications Conference).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Security policy checking in distributed SDN based clouds
Pisharody, S., Chowdhary, A. & Huang, D., Feb 21 2017, 2016 IEEE Conference on Communications and Network Security, CNS 2016. Institute of Electrical and Electronics Engineers Inc., p. 19-27 9 p. 7860466. (2016 IEEE Conference on Communications and Network Security, CNS 2016).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
16 Scopus citations -
Security policy integration and conflict reconciliation for collaborations among organizations in ubiquitous computing environments
Yau, S-S. & Chen, Z., 2008, Ubiquitous Intelligence and Computing - 5th International Conference, UIC 2008, Proceedings. p. 3-19 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5061 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
15 Scopus citations -
Security primitive design with nanoscale devices: A case study with resistive RAM
Karam, R., Liu, R., Chen, P. Y., Yu, S. & Bhunia, S., May 18 2016, GLSVLSI 2016 - Proceedings of the 2016 ACM Great Lakes Symposium on VLSI. Association for Computing Machinery, Vol. 18-20-May-2016. p. 299-304 6 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
9 Scopus citations -
Security screening via computational imaging using frequency-diverse metasurface apertures
Smith, D. R., Reynolds, M. S., Gollub, J. N., Marks, D. L., Imani, M. F., Yurduseven, O., Arnitz, D., Pedross-Engel, A., Sleasman, T., Trofatter, P., Boyarsky, M., Rose, A., Odabasi, H. & Lipworth, G., 2017, Passive and Active Millimeter-Wave Imaging XX. Wikner, D. A. & Robertson, D. A. (eds.). SPIE, 101890B. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 10189).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
12 Scopus citations -
Security threats in approximate computing systems
Yellu, P., Boskov, N., Kinsy, M. A. & Yu, Q., May 13 2019, GLSVLSI 2019 - Proceedings of the 2019 Great Lakes Symposium on VLSI. Association for Computing Machinery, p. 387-392 6 p. 3319453. (Proceedings of the ACM Great Lakes Symposium on VLSI, GLSVLSI).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access14 Scopus citations -
Sediment transport model considering turbulent flow
Tao, J. & Yu, X., Jan 1 2014, Geo-Congress 2014 Technical Papers: Geo-Characterization and Modeling for Sustainability - Proceedings of the 2014 Congress. 234 GSP ed. American Society of Civil Engineers (ASCE), p. 1072-1080 9 p. (Geotechnical Special Publication; no. 234 GSP).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Seeking an Optimal Approach for Computer-Aided Pulmonary Embolism Detection
Islam, N. U., Gehlot, S., Zhou, Z., Gotway, M. B. & Liang, J., 2021, Machine Learning in Medical Imaging - 12th International Workshop, MLMI 2021, Held in Conjunction with MICCAI 2021, Proceedings. Lian, C., Cao, X., Rekik, I., Xu, X. & Yan, P. (eds.). Springer Science and Business Media Deutschland GmbH, p. 692-702 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12966 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Scopus citations -
Seeking provenance of information using social media
Gundecha, P., Feng, Z. & Liu, H., Dec 11 2013, CIKM 2013 - Proceedings of the 22nd ACM International Conference on Information and Knowledge Management. p. 1691-1696 6 p. (International Conference on Information and Knowledge Management, Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
18 Scopus citations -
See UV on your skin: An ultraviolet sensing and visualization system
Zhang, X., Xu, W., Huang, M. C., Amini, N. & Ren, F., Oct 29 2013, Proceedings of the 8th International Conference on Body Area Networks, BodyNets 2013. Suzuki, J. & Wang, H. (eds.). ICST, p. 22-28 7 p. (Proceedings of the 8th International Conference on Body Area Networks, BodyNets 2013).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
8 Scopus citations -
SeGCom: Secure group communication in VANETs
Verma, M. & Huang, D., Apr 9 2009, 2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009. 4784943. (2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
44 Scopus citations -
Segmentation and tracking of 3D neuron microscopy images using a PDE based method and connected component labeling algorithm
Wang, Y., Jo, I., Wong, S., Yau, S. T. & Chan, T. F., Dec 1 2006, 2006 IEEE/NLM Life Science Systems and Applications Workshop, LiSA 2006. 4015833. (2006 IEEE/NLM Life Science Systems and Applications Workshop, LiSA 2006).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Scopus citations -
Seismic analysis of a geosynthetic liner system
Arab, M. G., Kavazanjian, E. & Matasovic, N., 2011, Geo-Frontiers 2011: Advances in Geotechnical Engineering - Proceedings of the Geo-Frontiers 2011 Conference. 211 GSP ed. p. 1981-1990 10 p. (Geotechnical Special Publication; no. 211 GSP).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
4 Scopus citations -
Seismic analysis of solid waste landfills
Kavazanjian, E. & Matasovic, N., 1995, Geotechnical Special Publication. 46 /2 ed. ASCE, p. 1066-1080 15 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
34 Scopus citations -
Seismic data compression
Jonsson, S. B. & Spanias, A., Dec 1 1990, Conference Proceedings - Annual Phoenix Conference. Publ by IEEE, p. 276-279 4 p. (Conference Proceedings - Annual Phoenix Conference).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Scopus citations -
Seismic response of a block on an inclined plane to vertical and horizontal excitation acting simultaneously
Yan, L., Matasovic, N. & Kavazanjian, E., 1996, Proceedings of Engineering Mechanics. New York, NY, United States: ASCE, Vol. 2. p. 1110-1113 4 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
19 Scopus citations -
Seizing Spin-offs’ and Parent Universities’ Resources and Capabilities: An Intertemporal Resilience
Audretsch, D., Belitski, M. & Guerrero, M., Jul 6 2022, Academy of Management Annual Meeting Proceedings . Academy of ManagementResearch output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Select-and-point: A novel interface for multi-device connection and control based on simple hand gestures
Lee, H., Jeong, H., Lee, J., Yeom, K. W., Shin, H. J. & Park, J. H., 2008, Conference on Human Factors in Computing Systems - Proceedings. p. 3357-3362 6 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
14 Scopus citations -
Selecting disorder-specific features for speech pathology fingerprinting
Berisha, V., Sandoval, S., Utianski, R., Liss, J. & Spanias, A., Oct 18 2013, 2013 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013 - Proceedings. p. 7562-7566 5 p. 6639133. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
10 Scopus citations -
Selecting military weapon systems development portfolios: Challenges in value measurement
Greiner, M. A., McNutt, R. T., Shunk, D. & Fowler, J., Dec 1 2002, PICMET. Kocaoglu, D. F., Anderson, T. R., Kocaoglu, D. F. & Anderson, T. R. (eds.). 1 p. (PICMET).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Selecting military weapon systems development portfolios: Challenges in value measurement
Greiner, M. A., McNutt, R. T., Shunk, D. & Fowler, J., Dec 1 2001, PICMET. Kocaoglu, D. F., Anderson, T. R., Kocaoglu, D. F. & Anderson, T. R. (eds.). p. 403-410 8 p. (PICMET).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Scopus citations -
Selection of best methods to calculate degradation rates of PV modules
Shrestha, S. & Tamizhmani, G., Dec 14 2015, 2015 IEEE 42nd Photovoltaic Specialist Conference, PVSC 2015. Institute of Electrical and Electronics Engineers Inc., 7355703Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
10 Scopus citations