Sciweavers

3212 search results - page 507 / 643
» Faster Concept Analysis
Sort
View
TSD
2007
Springer
15 years 5 months ago
Lexical and Perceptual Grounding of a Sound Ontology
Sound ontologies need to incorporate source unidentifiable sounds in an adequate and consistent manner. Computational lexical resources like WordNet have either inserted these des...
Anna Lobanova, Jennifer Spenader, Bea Valkenier
SP
2006
IEEE
109views Security Privacy» more  SP 2006»
15 years 5 months ago
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit “0” into a bi...
Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, R...
SPAA
2006
ACM
15 years 5 months ago
Towards a scalable and robust DHT
The problem of scalable and robust distributed data storage has recently attracted a lot of attention. A common approach in the area of peer-to-peer systems has been to use a dist...
Baruch Awerbuch, Christian Scheideler
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
15 years 4 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay
EVOW
2005
Springer
15 years 4 months ago
Order Preserving Clustering over Multiple Time Course Experiments
Abstract. Clustering still represents the most commonly used technique to analyze gene expression data—be it classical clustering approaches that aim at finding biologically rel...
Stefan Bleuler, Eckart Zitzler