Sciweavers

8337 search results - page 1492 / 1668
» Reasoning With Characteristic Models
Sort
View
EUROCRYPT
2000
Springer
15 years 8 months ago
Using Hash Functions as a Hedge against Chosen Ciphertext Attack
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem that is secure against adaptive chosen ciphertext attack provided the Decision...
Victor Shoup
INFOCOM
2000
IEEE
15 years 8 months ago
A Modular Approach to Packet Classification: Algorithms and Results
The ability to classify packets according to pre-defined rules is critical to providing many sophisticated value-added services, such as security, QoS, load balancing, traffic acco...
Thomas Y. C. Woo
PAKDD
2000
ACM
128views Data Mining» more  PAKDD 2000»
15 years 8 months ago
A Comparative Study of Classification Based Personal E-mail Filtering
This paper addresses personal E-mail filtering by casting it in the framework of text classification. Modeled as semi-structured documents, Email messages consist of a set of field...
Yanlei Diao, Hongjun Lu, Dekai Wu
RSCTC
2000
Springer
126views Fuzzy Logic» more  RSCTC 2000»
15 years 8 months ago
Evolutionary Parsing for a Probabilistic Context Free Grammar
Abstract. Classic parsing methods are based on complete search techniques to find the different interpretations of a sentence. However, the size of the search space increases expon...
Lourdes Araujo
SDB
1995
95views Database» more  SDB 1995»
15 years 8 months ago
Semantics of Database Transformations
Database transformations arise in many di erent settings including database integration, evolution of database systems, and implementing user views and data-entry tools. This paper...
Peter Buneman, Susan B. Davidson, Anthony Kosky
« Prev « First page 1492 / 1668 Last » Next »