Sciweavers

219 search results - page 17 / 44
» Context-aware counter abstraction
Sort
View
IACR
2011
139views more  IACR 2011»
13 years 9 months ago
SGCM: The Sophie Germain Counter Mode
Abstract. Sophie Germain Counter Mode (SGCM) is an authenticated encryption mode of operation, to be used with 128-bit block ciphers such as AES. SGCM is a variant of the NIST stan...
Markku-Juhani O. Saarinen
SPW
2005
Springer
15 years 3 months ago
Countering Automated Exploits with System Security CAPTCHAS
Abstract. Many users routinely log in to their system with system administrator privileges. This is especially true of home users. The advantage of this setup is that these users c...
Dinan Gunawardena, Jacob Scott, Alf Zugenmaier, Au...
91
Voted
AWIC
2003
Springer
15 years 2 months ago
A Machine Learning Based Evaluation of a Negotiation between Agents Involving Fuzzy Counter-Offers
Abstract. Negotiation plays a fundamental role in systems composed of multiple autonomous agents. Some negotiations may require a more elaborated dialogue where agents would explai...
Javier Carbo Rubiera, Agapito Ledezma
TABLEAUX
2009
Springer
15 years 2 months ago
Proof Search and Counter-Model Construction for Bi-intuitionistic Propositional Logic with Labelled Sequents
Abstract. Bi-intuitionistic logic is a conservative extension of intuitionistic logic with a connective dual to implication, called exclusion. We present a sound and complete cut-f...
Luis Pinto, Tarmo Uustalu
86
Voted
PAKDD
2010
ACM
134views Data Mining» more  PAKDD 2010»
14 years 11 months ago
Generating Diverse Ensembles to Counter the Problem of Class Imbalance
Abstract. One of the more challenging problems faced by the data mining community is that of imbalanced datasets. In imbalanced datasets one class (sometimes severely) outnumbers t...
T. Ryan Hoens, Nitesh V. Chawla