Sciweavers

978 search results - page 149 / 196
» Knowledge, Probability, and Adversaries
Sort
View
TSD
2004
Springer
15 years 3 months ago
Slovak Speech Database for Experiments and Application Building in Unit-Selection Speech Synthesis
Abstract. After the years of hesitation the conservative Slovak telecommunication market seems to become conscious of the need of voice driven services. In the last year, all the t...
Milan Rusko, Marián Trnka, Sachia Darz&aacu...
SIGIR
2003
ACM
15 years 3 months ago
Probabilistic term variant generator for biomedical terms
This paper presents an algorithm to generate possible variants for biomedical terms. The algorithm gives each variant its generation probability representing its plausibility, whi...
Yoshimasa Tsuruoka, Jun-ichi Tsujii
AUSAI
2003
Springer
15 years 3 months ago
BN+BN: Behavior Network with Bayesian Network for Intelligent Agent
Abstract. In the philosophy of behavior-based robotics, design of complex behavior needs the interaction of basic behaviors that are easily implemented. Action selection mechanism ...
Kyung-Joong Kim, Sung-Bae Cho
RAID
2001
Springer
15 years 2 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
SACRYPT
2001
Springer
123views Cryptology» more  SACRYPT 2001»
15 years 2 months ago
Weaknesses in the Key Scheduling Algorithm of RC4
Abstract. Inthis paper we present several weaknesses in the keyscheduling algorithm of RC4, and describe their cryptanalytic signi cance. We identify a large number of weak keys, i...
Scott R. Fluhrer, Itsik Mantin, Adi Shamir