Sciweavers

254 search results - page 22 / 51
» Binary amiable Words
Sort
View
124
Voted
WAIFI
2007
Springer
175views Mathematics» more  WAIFI 2007»
15 years 6 months ago
Attacking the Filter Generator over GF (2 m )
We consider the filter generator over GF(2m ) consisting of a linear feedback shift register of length k that generates a maximal length linear sequence of period 2mk − 1 over G...
Sondre Rønjom, Tor Helleseth
118
Voted
CIKM
2005
Springer
15 years 6 months ago
Fast webpage classification using URL features
We demonstrate the usefulness of the uniform resource locator (URL) alone in performing web page classification. This approach is magnitudes faster than typical web page classific...
Min-Yen Kan, Hoang Oanh Nguyen Thi
91
Voted
RAID
2005
Springer
15 years 6 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
79
Voted
TOIS
2002
87views more  TOIS 2002»
15 years 11 days ago
Peer-to-peer data trading to preserve information
Data archiving systems rely on replication to preserve information. This paper discusses how a network of autonomousarchiving sites can trade data to achievethe most reliable repl...
Brian F. Cooper, Hector Garcia-Molina
DCC
2008
IEEE
16 years 10 days ago
An improved list decoding algorithm for the second order Reed-Muller codes and its applications
We propose an algorithm which is an improved version of the Kabatiansky-Tavernier list decoding algorithm for the second order binary Reed-Muller code RM(2, m), of length n = 2m , ...
Rafaël Fourquet, Cédric Tavernier