Sciweavers

2663 search results - page 533 / 533
» How to Choose a Timing Model
Sort
View
ASIACRYPT
2003
Springer
13 years 10 months ago
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking
We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input, multiset hash functions operate on multisets (or sets). ...
Dwaine E. Clarke, Srinivas Devadas, Marten van Dij...
WWW
2007
ACM
14 years 6 months ago
Netprobe: a fast and scalable system for fraud detection in online auction networks
Given a large online network of online auction users and their histories of transactions, how can we spot anomalies and auction fraud? This paper describes the design and implemen...
Shashank Pandit, Duen Horng Chau, Samuel Wang, Chr...
ANLP
1994
101views more  ANLP 1994»
13 years 6 months ago
Sublanguage Engineering In The Fog System
FoG currently produces bilingual marine and public weather forecasts at several Canadian weather offices. The system is engineered to reflect "good professional style" a...
Richard I. Kittredge, Eli Goldberg, Myunghee Kim, ...