Sciweavers

3007 search results - page 505 / 602
» Designed -in-diagnostics: A new optical method
Sort
View
FPL
2008
Springer
131views Hardware» more  FPL 2008»
14 years 11 months ago
Enhancing COPACOBANA for advanced applications in cryptography and cryptanalysis
Cryptanalysis of symmetric and asymmetric ciphers is a challenging task due to the enormous amount of involved computations. To tackle this computational complexity, usually the e...
Tim Güneysu, Christof Paar, Gerd Pfeiffer, Ma...
INFOSCALE
2007
ACM
14 years 11 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
CIDR
2007
177views Algorithms» more  CIDR 2007»
14 years 11 months ago
bdbms - A Database Management System for Biological Data
Biologists are increasingly using databases for storing and managing their data. Biological databases typically consist of a mixture of raw data, metadata, sequences, annotations,...
Mohamed Y. Eltabakh, Mourad Ouzzani, Walid G. Aref
BIS
2008
114views Business» more  BIS 2008»
14 years 11 months ago
Determining Relevant Deep Web Sites by Query Context Identification
Deep web search requires a transformation between search keywords and semantically described and well-formed data structures. We approached this problem in our "In the Web of ...
Zsolt Tivadar Kardkovács, Domonkos Tikk
73
Voted
ICMLA
2008
14 years 11 months ago
Highly Scalable SVM Modeling with Random Granulation for Spam Sender Detection
Spam sender detection based on email subject data is a complex large-scale text mining task. The dataset consists of email subject lines and the corresponding IP address of the em...
Yuchun Tang, Yuanchen He, Sven Krasser