Sciweavers

3785 search results - page 704 / 757
» Immune System Based Intrusion Detection System
Sort
View
ADC
2005
Springer
124views Database» more  ADC 2005»
15 years 5 months ago
Removing XML Data Redundancies Using Functional and Equality-Generating Dependencies
We study the design issues of data-centric XML documents where (1) there are no mixed contents, i.e., each element may have some subelements and attributes, or it may have a singl...
Junhu Wang, Rodney W. Topor
ASIACRYPT
2005
Springer
15 years 5 months ago
Spreading Alerts Quietly and the Subgroup Escape Problem
We introduce a new cryptographic primitive called the blind coupon mechanism (BCM). In effect, the BCM is an authenticated bit commitment scheme, which is AND-homomorphic. It has n...
James Aspnes, Zoë Diamadi, Kristian Gjø...
IJCNLP
2005
Springer
15 years 5 months ago
Using Multiple Discriminant Analysis Approach for Linear Text Segmentation
Research on linear text segmentation has been an on-going focus in NLP for the last decade, and it has great potential for a wide range of applications such as document summarizati...
Jingbo Zhu, Na Ye, Xinzhi Chang, Wenliang Chen, Be...
SIGMETRICS
2004
ACM
115views Hardware» more  SIGMETRICS 2004»
15 years 5 months ago
Emulating low-priority transport at the application layer: a background transfer service
Low priority data transfer across the wide area is useful in several contexts, for example for the dissemination of large files such as OS updates, content distribution or prefet...
Peter B. Key, Laurent Massoulié, Bing Wang
CEAS
2004
Springer
15 years 5 months ago
Learning to Extract Signature and Reply Lines from Email
: We describe methods for automatically identifying signature blocks and reply lines in plaintext email messages. This analysis has many potential applications, such as preprocessi...
Vitor Rocha de Carvalho, William W. Cohen