Sciweavers

3367 search results - page 292 / 674
» Incremental assignment problem
Sort
View
USS
2008
15 years 6 months ago
Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods
Automated bot/botnet detection is a difficult problem given the high level of attacker power. We propose a systematic approach for evaluating the evadability of detection methods....
Elizabeth Stinson, John C. Mitchell
CANS
2008
Springer
111views Cryptology» more  CANS 2008»
15 years 6 months ago
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
In a (r, n)-threshold secret sharing scheme, no group of (r - 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time...
Tiancheng Lou, Christophe Tartary
CCCG
2008
15 years 5 months ago
An Efficient Query Structure for Mesh Refinement
We are interested in the following mesh refinement problem: given an input set of points P in Rd , we would like to produce a good-quality triangulation by adding new points in P....
Benoît Hudson, Duru Türkoglu
FORTE
2008
15 years 5 months ago
Protocol Modeling with Model Program Composition
Designing and interoperability testing of distributed, application-level network protocols is complex. Windows, for example, supports currently more than 200 protocols, ranging fro...
Margus Veanes, Wolfram Schulte
IJCAI
2007
15 years 5 months ago
Detecting Changes in Unlabeled Data Streams Using Martingale
The martingale framework for detecting changes in data stream, currently only applicable to labeled data, is extended here to unlabeled data using clustering concept. The one-pass...
Shen-Shyang Ho, Harry Wechsler