Sciweavers

4744 search results - page 147 / 949
» Connected Computing
Sort
View
IEEEARES
2006
IEEE
15 years 9 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
CRYPTO
1995
Springer
135views Cryptology» more  CRYPTO 1995»
15 years 6 months ago
Committed Oblivious Transfer and Private Multi-Party Computation
Abstract. In this paper we present an eficient protocol for “Committed Oblivious Transfer” to perform oblivious transfer on committed bits: suppose Alice is committed to bits 0...
Claude Crépeau, Jeroen van de Graaf, Alain ...
CSE
2009
IEEE
15 years 6 months ago
Extended Dempster-Shafer Theory in Context Reasoning for Ubiquitous Computing Environments
—Context, the pieces of information that capture the characteristics of ubiquitous computing environment, is often imprecise and incomplete due to user mobility, unreliable wirel...
Daqiang Zhang, Jiannong Cao, Jingyu Zhou, Minyi Gu...
115
Voted
CORR
2010
Springer
126views Education» more  CORR 2010»
15 years 3 months ago
Extending scientific computing system with structural quantum programming capabilities
We present the basic high-level structures used for developing quantum programming languages. The presented structures are commonly used in many existing quantum programming langua...
P. Gawron, Jerzy Klamka, J. A. Miszczak, Ryszard W...
LCN
2007
IEEE
15 years 9 months ago
A Simulation Study of Multi-Color Marking of TCP Aggregates
— Service Level Agreements (SLAs) are contracts signed between a provider and a customer to govern the amount of traffic that will be serviced. This work pinpoints an important ...
Miriam Allalouf, Yuval Shavitt