Sciweavers

1314 search results - page 244 / 263
» New Approaches for Virtual Private Network Design
Sort
View
108
Voted
FOSAD
2000
Springer
15 years 5 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
KBS
2002
106views more  KBS 2002»
15 years 1 months ago
Hybrid decision tree
In this paper, a hybrid learning approach named HDT is proposed. HDT simulates human reasoning by using symbolic learning to do qualitative analysis and using neural learning to d...
Zhi-Hua Zhou, Zhaoqian Chen
CIKM
2010
Springer
15 years 10 days ago
Automatic metadata extraction from multilingual enterprise content
Enterprises provide professionally authored content about their products/services in different languages for use in web sites and customer care. For customer care, personalization...
Melike Sah, Vincent Wade
MIDDLEWARE
2010
Springer
15 years 5 days ago
Automatically Generating Symbolic Prefetches for Distributed Transactional Memories
Abstract. Developing efficient distributed applications while managing complexity can be challenging. Managing network latency is a key challenge for distributed applications. We ...
Alokika Dash, Brian Demsky
ACISP
2006
Springer
15 years 7 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros