Sciweavers

3137 search results - page 610 / 628
» A Text Understander that Learns
Sort
View
119
Voted
TCC
2007
Springer
86views Cryptology» more  TCC 2007»
15 years 8 months ago
Weakly-Private Secret Sharing Schemes
Abstract. Secret-sharing schemes are an important tool in cryptography that is used in the construction of many secure protocols. However, the shares’ size in the best known secr...
Amos Beimel, Matthew K. Franklin
VIZSEC
2007
Springer
15 years 8 months ago
An Interactive Attack Graph Cascade and Reachability Display
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
Leevar Williams, Richard Lippmann, Kyle Ingols
134
Voted
ACSC
2006
IEEE
15 years 8 months ago
Using formal concept analysis with an incremental knowledge acquisition system for web document management
It is necessary to provide a method to store Web information effectively so it can be utilised as a future knowledge resource. A commonly adopted approach is to classify the retri...
Timothy J. Everts, Sung Sik Park, Byeong Ho Kang
IJCNN
2006
IEEE
15 years 8 months ago
An optimization approach to achieve unsupervised segmentation and binding in a dynamical network
— We present a novel network of oscillatory units, whose behavior is described by the amplitude and phase of oscillations. While building on previous work, the system presented i...
A. Ravishankar Rao, Guillermo A. Cecchi, Charles C...
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
15 years 8 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...