Sciweavers

1229 search results - page 104 / 246
» On the gaussian distribution of strings
Sort
View
107
Voted
IPPS
2007
IEEE
15 years 7 months ago
Design Alternatives for a High-Performance Self-Securing Ethernet Network Interface
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection system into a high-performance programmable Ethernet network interface card (NIC...
Derek L. Schuff, Vijay S. Pai
GECCO
2007
Springer
162views Optimization» more  GECCO 2007»
15 years 7 months ago
Some novel locality results for the blob code spanning tree representation
The Blob Code is a bijective tree code that represents each tree on n labelled vertices as a string of n − 2 vertex labels. In recent years, several researchers have deployed th...
Tim Paulden, David K. Smith
116
Voted
CRYPTO
2005
Springer
72views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
Unconditional Characterizations of Non-interactive Zero-Knowledge
Abstract. Non-interactive zero-knowledge (NIZK) proofs have been investigated in two models: the Public Parameter model and the Secret Parameter model. In the former, a public stri...
Rafael Pass, Abhi Shelat
98
Voted
FSMNLP
2005
Springer
15 years 6 months ago
Algorithms for Minimum Risk Chunking
Abstract. Stochastic finite automata are useful for identifying substrings (chunks) within larger units of text. Relevant applications include tokenization, base-NP chunking, name...
Martin Jansche
97
Voted
LATIN
2004
Springer
15 years 6 months ago
On the (Im)possibility of Non-interactive Correlation Distillation
We study the problem of non-interactive correlation distillation (NICD). Suppose Alice and Bob each has a string, denoted by A = a0a1 · · · an−1 and B = b0b1 · · · bn−1,...
Ke Yang