Sciweavers

1005 search results - page 88 / 201
» Practical Secure Function Evaluation
Sort
View
97
Voted
ACSAC
2000
IEEE
15 years 5 months ago
Two State-based Approaches to Program-based Anomaly Detection
This paper describes two recently developed intrusion detection algorithms, and gives experimental results on their performance. The algorithms detect anomalies in execution audit...
Christoph C. Michael, Anup K. Ghosh
CCE
2004
15 years 17 days ago
Balanced random interval arithmetic
The results of experimental testing of balanced random interval arithmetic with typical mathematical test functions and practical problem are presented and discussed. The possibili...
Julius Zilinskas, Ian David Lockhart Bogle
130
Voted
WETICE
2003
IEEE
15 years 6 months ago
Design and Implementation of Virtual Private Services
Large scale distributed applications such as electronic commerce and online marketplaces combine network access with multiple storage and computational elements. The distributed r...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
103
Voted
IADIS
2004
15 years 2 months ago
Addressing the Effective Use of Learning Objects Through Teacher Education
This paper describes the development and evaluation of a curriculum designed to help teachers learn about and integrate digital library functionalities and learning objects into t...
Mimi Recker
AAAI
2000
15 years 2 months ago
Generalizing Boundary Points
The complexity of numerical domain partitioning depends on the number of potential cut points. In multiway partitioning this dependency is often quadratic, even exponential. There...
Tapio Elomaa, Juho Rousu