Sciweavers

21324 search results - page 4002 / 4265
» Making the case for computing
Sort
View
RAID
2007
Springer
15 years 9 months ago
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
Xuxian Jiang, Xinyuan Wang
SCALESPACE
2007
Springer
15 years 9 months ago
Faithful Recovery of Vector Valued Functions from Incomplete Data
On March 11, 1944, the famous Eremitani Church in Padua (Italy) was destroyed in an Allied bombing along with the inestimable frescoes by Andrea Mantegna et al. contained in the Ov...
Massimo Fornasier
SEMWEB
2007
Springer
15 years 9 months ago
Lightweight Community-Driven Ontology Evolution
Only few well-maintained domain ontologies can be found on the Web. The likely reasons for the lack of useful domain ontologies include that (1) informal means to convey intended m...
Katharina Siorpaes
134
Voted
SEMWEB
2007
Springer
15 years 9 months ago
ASMOV Results for OAEI 2007
Numerous ontology alignment algorithms have appeared in the literature in recent years, but only a few make use of the semantics enclosed within the ontologies in order to improve ...
Yves R. Jean-Mary, Mansur R. Kabuka
TCC
2007
Springer
142views Cryptology» more  TCC 2007»
15 years 9 months ago
On Best-Possible Obfuscation
An obfuscator is a compiler that transforms any program (which we will view in this work as a boolean circuit) into an obfuscated program (also a circuit) that has the same input-...
Shafi Goldwasser, Guy N. Rothblum
« Prev « First page 4002 / 4265 Last » Next »