Sciweavers

3134 search results - page 267 / 627
» Computing full disjunctions
Sort
View
FSE
2004
Springer
125views Cryptology» more  FSE 2004»
15 years 7 months ago
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
ded abstract of this paper appears in Fast Software Encryption, FSE 2004, Lecture Notes in Computer Science, W. Meier and B. Roy editors, Springer-Verlag, 2004. This is the full ve...
Tetsu Iwata, Tadayoshi Kohno
CCS
2008
ACM
15 years 5 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
137
Voted
LREC
2010
164views Education» more  LREC 2010»
15 years 4 months ago
The POETICON Corpus: Capturing Language Use and Sensorimotor Experience in Everyday Interaction
Natural language use, acquisition, and understanding takes place usually in multisensory and multimedia communication environments. Therefore, for one to model language in its int...
Katerina Pastra, Christian Wallraven, Michael Schu...
LISA
1993
15 years 4 months ago
Forecasting Disk Resource Requirements for a Usenet Server
Three years ago the Stanford Linear Accelerator Center (SLAC) decided to embrace netnews as a site-wide, multi-platform communications tool for the laboratory’s diverse user com...
Karl L. Swartz
BMCBI
2007
114views more  BMCBI 2007»
15 years 3 months ago
Probabilistic prediction and ranking of human protein-protein interactions
Background: Although the prediction of protein-protein interactions has been extensively investigated for yeast, few such datasets exist for the far larger proteome in human. Furt...
Michelle S. Scott, Geoffrey J. Barton