Sciweavers

99 search results - page 14 / 20
» Quasi-copulas and signed measures
Sort
View
CCS
2006
ACM
15 years 1 months ago
Lightweight, pollution-attack resistant multicast authentication scheme
Authentication is an important security measure for multicast applications, providing receivers with confidence that the packets they receive are valid. Simply signing every multi...
Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin
CARDIS
2008
Springer
165views Hardware» more  CARDIS 2008»
14 years 11 months ago
Malicious Code on Java Card Smartcards: Attacks and Countermeasures
When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens u...
Wojciech Mostowski, Erik Poll
SODA
2008
ACM
144views Algorithms» more  SODA 2008»
14 years 11 months ago
Fast dimension reduction using Rademacher series on dual BCH codes
The Fast Johnson-Lindenstrauss Transform (FJLT) was recently discovered by Ailon and Chazelle as a novel technique for performing fast dimension reduction with small distortion fr...
Nir Ailon, Edo Liberty
UAI
1996
14 years 10 months ago
A Qualitative Markov Assumption and Its Implications for Belief Change
The study of belief change has been an active area in philosophy and AI. In recent years, two special cases of belief change, belief revision and belief update, have been studied ...
Nir Friedman, Joseph Y. Halpern
ALGORITHMICA
2007
145views more  ALGORITHMICA 2007»
14 years 9 months ago
Counting Integer Points in Parametric Polytopes Using Barvinok's Rational Functions
Abstract Many compiler optimization techniques depend on the ability to calculate the number of elements that satisfy certain conditions. If these conditions can be represented by ...
Sven Verdoolaege, Rachid Seghir, Kristof Beyls, Vi...