Sciweavers

1828 search results - page 320 / 366
» From Features to Semantics: Some Preliminary Results
Sort
View
INFOCOM
2008
IEEE
15 years 4 months ago
Spatial-Temporal Characteristics of Internet Malicious Sources
—This paper presents a large scale longitudinal study of the spatial and temporal features of malicious source addresses. The basis of our study is a 402-day trace of over 7 bill...
Zesheng Chen, Chuanyi Ji, Paul Barford
ISORC
2008
IEEE
15 years 4 months ago
A Flexible Trust Model for Distributed Service Infrastructures
Recent years have witnessed the emergence and rapid growth of distributed service infrastructures such as mobile ad hoc networks, P2P, PlanetLab and Grids. In such distributed inf...
Zhaoyu Liu, Stephen S. Yau, Dichao Peng, Yin Yin
SP
2008
IEEE
110views Security Privacy» more  SP 2008»
15 years 4 months ago
Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations
Despite the rapid adoption of Voice over IP (VoIP), its security implications are not yet fully understood. Since VoIP calls may traverse untrusted networks, packets should be enc...
Charles V. Wright, Lucas Ballard, Scott E. Coull, ...
LICS
2007
IEEE
15 years 4 months ago
Environmental Bisimulations for Higher-Order Languages
Developing a theory of bisimulation in higher-order languages can be hard. Particularly challenging can be: (1) the proof of congruence, as well as enhancements of the bisimulatio...
Davide Sangiorgi, Naoki Kobayashi, Eijiro Sumii
CICLING
2007
Springer
15 years 4 months ago
Morphological Disambiguation of Turkish Text with Perceptron Algorithm
Abstract. This paper describes the application of the perceptron algorithm to the morphological disambiguation of Turkish text. Turkish has a productive derivational morphology. Du...
Hasim Sak, Tunga Güngör, Murat Saraclar