Sciweavers

7978 search results - page 1278 / 1596
» Combining shared-coin algorithms
Sort
View
NSPW
2004
ACM
15 years 10 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
134
Voted
SAC
2004
ACM
15 years 10 months ago
Axes-based visualizations with radial layouts
In the analysis of multidimensional data sets questions involving detection of extremal events, correlations, patterns and trends play an increasingly important role in a variety ...
Christian Tominski, James Abello, Heidrun Schumann
ARCS
2004
Springer
15 years 10 months ago
Latent Semantic Indexing in Peer-to-Peer Networks
Searching in decentralized peer-to-peer networks is a challenging problem. In common applications such as Gnutella, searching is performed by randomly forwarding queries to all pee...
Xuezheng Liu, Ming Chen, Guangwen Yang
144
Voted
CMMR
2004
Springer
168views Music» more  CMMR 2004»
15 years 10 months ago
Internet Archive of Electronic Music IAEM - internet Audio Rendering System iARS
Abstract. The Internet Archive for Electronic Music (IAEM) is intended to be a platform to access an extensive and distributed archive of electronic music. It combines collaborativ...
Christopher Frauenberger, Winfried Ritsch
129
Voted
COCO
2004
Springer
156views Algorithms» more  COCO 2004»
15 years 10 months ago
Multiparty Quantum Coin Flipping
We investigate coin-flipping protocols for multiple parties in a quantum broadcast setting: • We propose and motivate a definition for quantum broadcast. Our model of quantum ...
Andris Ambainis, Harry Buhrman, Yevgeniy Dodis, He...
« Prev « First page 1278 / 1596 Last » Next »