Sciweavers

2321 search results - page 94 / 465
» Multiple Predicate Learning
Sort
View
ECCC
2000
113views more  ECCC 2000»
14 years 9 months ago
Candidate One-Way Functions Based on Expander Graphs
Abstract. We suggest a candidate one-way function using combinatorial constructs such as expander graphs. These graphs are used to determine a sequence of small overlapping subsets...
Oded Goldreich
FAST
2009
14 years 7 months ago
Scalable Access Controls for Lineage
Lineage stores often contain sensitive information that needs protection from unauthorized access. We build on prior work for security and privacy of lineage information, focusing...
Arnon Rosenthal, Len Seligman, Adriane Chapman, Ba...
HCI
2007
14 years 11 months ago
Learning by e-Learning: Breaking Down Barriers and Creating Opportunities for the Visually-Impaired
Today e-Learning is an important educational tool with multiple benefits. However, to be suitable for a large audience the learning objects, courses, and other forms of e-Learning ...
Barbara Leporini, Marina Buzzi
DSN
2003
IEEE
15 years 3 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
SRDS
2010
IEEE
14 years 7 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...