Sciweavers

1786 search results - page 229 / 358
» Domain Independent Generative Modeling
Sort
View
142
Voted
SAC
2006
ACM
15 years 9 months ago
A probability analysis for candidate-based frequent itemset algorithms
This paper explores the generation of candidates, which is an important step in frequent itemset mining algorithms, from a theoretical point of view. Important notions in our prob...
Nele Dexters, Paul W. Purdom, Dirk Van Gucht
133
Voted
ICAPR
2005
Springer
15 years 9 months ago
GP Ensemble for Distributed Intrusion Detection Systems
In this paper an intrusion detection algorithm based on GP ensembles is proposed. The algorithm runs on a distributed hybrid multiisland model-based environment to monitor security...
Gianluigi Folino, Clara Pizzuti, Giandomenico Spez...
124
Voted
SAC
2004
ACM
15 years 9 months ago
Multilingual semantic elaboration in the DOSE platform
From the early World Wide Web exploitation until contemporary Semantic Web generation, global communication has become an essential need for many people on the Internet. Globaliza...
Dario Bonino, Fulvio Corno, Laura Farinetti, Andre...
126
Voted
TCC
2004
Springer
100views Cryptology» more  TCC 2004»
15 years 9 months ago
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes
In earlier work, we described a “pathological” example of a signature scheme that is secure in the Random Oracle Model, but for which no secure implementation exists. For that...
Ran Canetti, Oded Goldreich, Shai Halevi
131
Voted
EUROMICRO
2003
IEEE
15 years 9 months ago
Web Service Engineering with DIWE
A Web service is frequently defined as browser-less access to content on a Web site. The industry’s focus to date has been on providing easy-to-use low-level libraries, tools a...
Engin Kirda, Clemens Kerer, Christopher Krüge...