Sciweavers

7329 search results - page 3 / 1466
» Network Extractor Protocols
Sort
View
FOCS
2009
IEEE
13 years 12 months ago
Extracting Correlations
Abstract— Motivated by applications in cryptography, we consider a generalization of randomness extraction and the related notion of privacy amplification to the case of two cor...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
EUROCRYPT
2009
Springer
14 years 5 months ago
Key Agreement from Close Secrets over Unsecured Channels
We consider information-theoretic key agreement between two parties sharing somewhat different versions of a secret w that has relatively little entropy. Such key agreement, also ...
Bhavana Kanukurthi, Leonid Reyzin
INFOCOM
2012
IEEE
11 years 7 months ago
FlowSifter: A counting automata approach to layer 7 field extraction for deep flow inspection
Abstract—In this paper, we introduce FlowSifter, a systematic framework for online application protocol field extraction. FlowSifter introduces a new grammar model Counting Regu...
Chad R. Meiners, Eric Norige, Alex X. Liu, Eric To...
IICAI
2007
13 years 6 months ago
Extractive Summarization in Clinical Trials Protocol Summaries: A Case Study
This paper presents a method for extracting purpose statements from clinical trial protocol summaries. Simple summarization technology based on regular expressions and natural lang...
Graciela Rosemblat, Laurel Graham, Tony Tse
ICDAR
2007
IEEE
13 years 11 months ago
A Sparse and Locally Shift Invariant Feature Extractor Applied to Document Images
We describe an unsupervised learning algorithm for extracting sparse and locally shift-invariant features. We also devise a principled procedure for learning hierarchies of invari...
Marc'Aurelio Ranzato, Yann LeCun