Sciweavers

1315 search results - page 203 / 263
» Discovering significant rules
Sort
View
APPROX
2007
Springer
104views Algorithms» more  APPROX 2007»
15 years 6 months ago
Worst-Case to Average-Case Reductions Revisited
Abstract. A fundamental goal of computational complexity (and foundations of cryptography) is to find a polynomial-time samplable distribution (e.g., the uniform distribution) and...
Dan Gutfreund, Amnon Ta-Shma
SAC
2006
ACM
15 years 5 months ago
Noxes: a client-side solution for mitigating cross-site scripting attacks
Web applications are becoming the dominant way to provide access to on-line services. At the same time, web application vulnerabilities are being discovered and disclosed at an al...
Engin Kirda, Christopher Krügel, Giovanni Vig...
ECBS
2005
IEEE
179views Hardware» more  ECBS 2005»
15 years 5 months ago
Prototype of Fault Adaptive Embedded Software for Large-Scale Real-Time Systems
This paper describes a comprehensive prototype of large-scale fault adaptive embedded software developed for the proposed Fermilab BTeV high energy physics experiment. Lightweight...
Derek Messie, Mina Jung, Jae C. Oh, Shweta Shetty,...
CCS
2005
ACM
15 years 5 months ago
A rewriting-based inference system for the NRL protocol analyzer: grammar generation
The NRL Protocol Analyzer (NPA) is a tool for the formal specification and analysis of cryptographic protocols that has been used with great effect on a number of complex real-l...
Santiago Escobar, Catherine Meadows, José M...
RSFDGRC
2005
Springer
111views Data Mining» more  RSFDGRC 2005»
15 years 5 months ago
Knowledge Discovery Based Query Answering in Hierarchical Information Systems
The paper concerns failing queries in incomplete Distributed Autonomous Information Systems (DAIS) based on attributes which are hierarchical and which semantics at different site...
Zbigniew W. Ras, Agnieszka Dardzinska, Osman G&uum...