Sciweavers

165 search results - page 2 / 33
» Playing hide-and-seek with correlations
Sort
View
ERCIMDL
2008
Springer
181views Education» more  ERCIMDL 2008»
13 years 7 months ago
Author Name Disambiguation for Citations Using Topic and Web Correlation
Abstract. Today, bibliographic digital libraries play an important role in helping members of academic community search for novel research. In particular, author disambiguation for...
Kai-Hsiang Yang, Hsin-Tsung Peng, Jian-Yi Jiang, H...
ACTAC
2002
87views more  ACTAC 2002»
13 years 5 months ago
Platform Independent Tool for Local Event Correlation
Event correlation plays a crucial role in network management systems, helping to reduce the amount of event messages and making their meaning clearer to a human operator. In early...
Risto Vaarandi
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
13 years 11 months ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay
EUROCRYPT
2000
Springer
13 years 9 months ago
Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5
Abstract. This paper describes new techniques for fast correlation attacks, based on Gallager iterative decoding algorithm using parity-check equations of weight greater than 3. Th...
Anne Canteaut, Michaël Trabbia
ER
2007
Springer
125views Database» more  ER 2007»
13 years 11 months ago
On the Correlation between Process Model Metrics and Errors
Business process models play an important role for the management, design, and improvement of process organizations and process-aware information systems. Despite the extensive ap...
Jan Mendling, Gustaf Neumann, Wil M. P. van der Aa...