Sciweavers

1186 search results - page 57 / 238
» A New Approach to Secure Logging
Sort
View
ECCC
2010
89views more  ECCC 2010»
15 years 18 days ago
Estimating the unseen: A sublinear-sample canonical estimator of distributions
We introduce a new approach to characterizing the unobserved portion of a distribution, which provides sublinear-sample additive estimators for a class of properties that includes...
Gregory Valiant, Paul Valiant
EMNLP
2007
15 years 2 months ago
Enhancing Single-Document Summarization by Combining RankNet and Third-Party Sources
We present a new approach to automatic summarization based on neural nets, called NetSum. We extract a set of features from each sentence that helps identify its importance in the...
Krysta Marie Svore, Lucy Vanderwende, Christopher ...
126
Voted
HPDC
2003
IEEE
15 years 5 months ago
Security for Grid Services
Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations.” The dynamic and multi-institutional nature of ...
Von Welch, Frank Siebenlist, Ian T. Foster, John B...
94
Voted
ESOP
2005
Springer
15 years 6 months ago
Computationally Sound, Automated Proofs for Security Protocols
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and ...
Véronique Cortier, Bogdan Warinschi
86
Voted
JCS
2002
94views more  JCS 2002»
15 years 6 days ago
Model-Based Analysis of Configuration Vulnerabilities
Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to compromise their security. In this paper we describe a ...
C. R. Ramakrishnan, R. C. Sekar