Sciweavers

1584 search results - page 278 / 317
» Making priors a priority
Sort
View
CCS
2008
ACM
15 years 1 months ago
Minimal backups of cryptographic protocol runs
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Jay A. McCarthy, Shriram Krishnamurthi
CCS
2008
ACM
15 years 1 months ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...
CCS
2008
ACM
15 years 1 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
KDD
2010
ACM
323views Data Mining» more  KDD 2010»
15 years 1 months ago
TIARA: a visual exploratory text analytic system
In this paper, we present a novel exploratory visual analytic system called TIARA (Text Insight via Automated Responsive Analytics), which combines text analytics and interactive ...
Furu Wei, Shixia Liu, Yangqiu Song, Shimei Pan, Mi...
KDD
2010
ACM
242views Data Mining» more  KDD 2010»
15 years 1 months ago
A scalable two-stage approach for a class of dimensionality reduction techniques
Dimensionality reduction plays an important role in many data mining applications involving high-dimensional data. Many existing dimensionality reduction techniques can be formula...
Liang Sun, Betul Ceran, Jieping Ye