Sciweavers

1227 search results - page 141 / 246
» Collaboration in parallel worlds
Sort
View
COLCOM
2005
IEEE
15 years 6 months ago
An experimental evaluation of spam filter performance and robustness against attack
— In this paper, we show experimentally that learning filters are able to classify large corpora of spam and legitimate email messages with a high degree of accuracy. The corpor...
Steve Webb, Subramanyam Chitti, Calton Pu
ISORC
2005
IEEE
15 years 6 months ago
A GTRBAC Based System for Dynamic Workflow Composition and Management
In this paper, we propose an architecture for adaptive real-time workflow-based collaborative system. Such a system is needed to support real-time communication and sharing of inf...
Basit Shafiq, Arjmand Samuel, Halima Ghafoor
MIDDLEWARE
2004
Springer
15 years 6 months ago
Data pipelines: enabling large scale multi-protocol data transfers
Collaborating users need to move terabytes of data among their sites, often involving multiple protocols. This process is very fragile and involves considerable human involvement ...
Tevfik Kosar, George Kola, Miron Livny
SAC
2009
ACM
15 years 5 months ago
A taxonomy and adversarial model for attacks against network log anonymization
In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have be...
Justin King, Kiran Lakkaraju, Adam J. Slagell
CRYPTO
2005
Springer
164views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
Composition Does Not Imply Adaptive Security
We study the question whether the sequential or parallel composition of two functions, each indistinguishable from a random function by non-adaptive distinguishers is secure agains...
Krzysztof Pietrzak