Sciweavers

1628 search results - page 77 / 326
» Compiler Construction Using Scheme
Sort
View
ACNS
2009
Springer
113views Cryptology» more  ACNS 2009»
15 years 3 months ago
Fast Packet Classification Using Condition Factorization
Abstract. Rule-based packet classification plays a central role in network intrusion detection systems such as Snort. To enhance performance, these rules are typically compiled int...
Alok Tongaonkar, R. Sekar, Sreenaath Vasudevan
SSR
1997
93views more  SSR 1997»
15 years 1 months ago
Using Content-Derived Names for Configuration Management
Configuration management of compiled software artifacts (programs, libraries, icons, etc.) is a growing problem as software reuse becomes more prevalent. For an application compos...
Jeffrey K. Hollingsworth, Ethan L. Miller
ICRA
2008
IEEE
208views Robotics» more  ICRA 2008»
15 years 6 months ago
Unsupervised body scheme learning through self-perception
— In this paper, we present an approach allowing a robot to learn a generative model of its own physical body from scratch using self-perception with a single monocular camera. O...
Jürgen Sturm, Christian Plagemann, Wolfram Bu...
FORTE
2003
15 years 1 months ago
A Lightweight Formal Analysis of a Multicast Key Management Scheme
Abstract. This paper describes the analysis of Pull-Based Asynchronous Rekeying Framework (ARF), a recently proposed solution to the scalable group key management problem in secure...
Mana Taghdiri, Daniel Jackson
IJNSEC
2008
112views more  IJNSEC 2008»
14 years 12 months ago
A New and Efficient Signature on Commitment Values
We present a new short signature scheme based on a variant of the Boneh-Boyen's short signatures schemes. Our short signature scheme is secure without requiring the random or...
Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo