Sciweavers

205 search results - page 22 / 41
» Detecting algorithmically generated malicious domain names
Sort
View
CORR
2006
Springer
178views Education» more  CORR 2006»
14 years 12 months ago
A tool set for the quick and efficient exploration of large document collections
: We are presenting a set of multilingual text analysis tools that can help analysts in any field to explore large document collections quickly in order to determine whether the do...
Camelia Ignat, Bruno Pouliquen, Ralf Steinberger, ...
SOUPS
2006
ACM
15 years 5 months ago
The methodology and an application to fight against Unicode attacks
Unicode is becoming a dominant character representation format for information processing. This presents a very dangerous usability and security problem for many applications. The...
Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Litt...
CANS
2011
Springer
258views Cryptology» more  CANS 2011»
13 years 11 months ago
Fast Computation on Encrypted Polynomials and Applications
In this paper, we explore fast algorithms for computing on encrypted polynomials. More specifically, we describe efficient algorithms for computing the Discrete Fourier Transform,...
Payman Mohassel
EMNLP
2010
14 years 9 months ago
The Necessity of Combining Adaptation Methods
Problems stemming from domain adaptation continue to plague the statistical natural language processing community. There has been continuing work trying to find general purpose al...
Ming-Wei Chang, Michael Connor, Dan Roth
ATAL
2005
Springer
15 years 5 months ago
Preprocessing techniques for accelerating the DCOP algorithm ADOPT
Methods for solving Distributed Constraint Optimization Problems (DCOP) have emerged as key techniques for distributed reasoning. Yet, their application faces significant hurdles...
Syed Muhammad Ali, Sven Koenig, Milind Tambe