Sciweavers

3528 search results - page 568 / 706
» A New Approach to Planning in Networks
Sort
View
SACRYPT
2009
Springer
130views Cryptology» more  SACRYPT 2009»
15 years 4 months ago
Format-Preserving Encryption
Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of identical format—for example, encrypting a valid credit-card number into a ...
Mihir Bellare, Thomas Ristenpart, Phillip Rogaway,...
ICASSP
2008
IEEE
15 years 4 months ago
Bayesian update of dialogue state for robust dialogue systems
This paper presents a new framework for accumulating beliefs in spoken dialogue systems. The technique is based on updating a Bayesian Network that represents the underlying state...
Blaise Thomson, Jost Schatzmann, Steve Young
IPCCC
2006
IEEE
15 years 4 months ago
On capturing and containing E-mail worms
Capturing an e-mail worm and containing its propagation as early as possible is desirable in order to provide better protection for the networks and hosts against severe damage th...
Chin-Tser Huang, Nathan L. Johnson, Jeff Janies, A...
LCN
2005
IEEE
15 years 3 months ago
On the Server Fairness of Congestion Control in the ISP Edge Router
The Internet Engineering Task Force (IETF) recommended the deployment of Active Queue Management (AQM) in the Internet routers in 1998. There were more than 50 new AQM algorithms ...
Hsien-Ming Wu, Chin-Chi Wu, Woei Lin
SC
2005
ACM
15 years 3 months ago
Intelligent Feature Extraction and Tracking for Visualizing Large-Scale 4D Flow Simulations
Terascale simulations produce data that is vast in spatial, temporal, and variable domains, creating a formidable challenge for subsequent analysis. Feature extraction as a data r...
Fan-Yin Tzeng, Kwan-Liu Ma