Sciweavers

124 search results - page 18 / 25
» Real World Patterns of Failure in Anonymity Systems
Sort
View
PKC
2004
Springer
106views Cryptology» more  PKC 2004»
15 years 5 months ago
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features ...
Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, H...
KDD
2000
ACM
211views Data Mining» more  KDD 2000»
15 years 3 months ago
Mining IC test data to optimize VLSI testing
We describe an application of data mining and decision analysis to the problem of die-level functional test in integrated circuit manufacturing. Integrated circuits are fabricated...
Tony Fountain, Thomas G. Dietterich, Bill Sudyka
ATAL
2008
Springer
15 years 1 months ago
Role-based teamwork activity recognition in observations of embodied agent actions
Recognizing team actions in the behavior of embodied agents has many practical applications and had seen significant progress in recent years. One approach with proven results is ...
Linus J. Luotsinen, Ladislau Bölöni
JSS
2008
157views more  JSS 2008»
14 years 11 months ago
Can k-NN imputation improve the performance of C4.5 with small software project data sets? A comparative evaluation
Missing data is a widespread problem that can affect the ability to use data to construct effective prediction systems. We investigate a common machine learning technique that can...
Qinbao Song, Martin J. Shepperd, Xiangru Chen, Jun...
AR
2007
138views more  AR 2007»
14 years 11 months ago
Integrating robotics and neuroscience: brains for robots, bodies for brains
—Researchers in robotics and artificial intelligence have often looked at biology as a source of inspiration for solving their problems. From the opposite perspective, neuroscie...
Michele Rucci, Daniel Bullock, Fabrizio Santini