Sciweavers

254 search results - page 22 / 51
» Binary amiable Words
Sort
View
WAIFI
2007
Springer
175views Mathematics» more  WAIFI 2007»
15 years 5 months ago
Attacking the Filter Generator over GF (2 m )
We consider the filter generator over GF(2m ) consisting of a linear feedback shift register of length k that generates a maximal length linear sequence of period 2mk − 1 over G...
Sondre Rønjom, Tor Helleseth
CIKM
2005
Springer
15 years 4 months ago
Fast webpage classification using URL features
We demonstrate the usefulness of the uniform resource locator (URL) alone in performing web page classification. This approach is magnitudes faster than typical web page classific...
Min-Yen Kan, Hoang Oanh Nguyen Thi
RAID
2005
Springer
15 years 4 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
TOIS
2002
87views more  TOIS 2002»
14 years 10 months ago
Peer-to-peer data trading to preserve information
Data archiving systems rely on replication to preserve information. This paper discusses how a network of autonomousarchiving sites can trade data to achievethe most reliable repl...
Brian F. Cooper, Hector Garcia-Molina
DCC
2008
IEEE
15 years 10 months ago
An improved list decoding algorithm for the second order Reed-Muller codes and its applications
We propose an algorithm which is an improved version of the Kabatiansky-Tavernier list decoding algorithm for the second order binary Reed-Muller code RM(2, m), of length n = 2m , ...
Rafaël Fourquet, Cédric Tavernier