Sciweavers

2176 search results - page 269 / 436
» Refactoring Methods for Knowledge Bases
Sort
View
131
Voted
MMSEC
2005
ACM
147views Multimedia» more  MMSEC 2005»
15 years 9 months ago
A Bayesian image steganalysis approach to estimate the embedded secret message
Image steganalysis so far has dealt only with detection of a hidden message and estimation of some of its parameters (e.g., message length and secret key). To our knowledge, so fa...
Aruna Ambalavanan, Rajarathnam Chandramouli
ASP
2005
Springer
15 years 9 months ago
Combining Answer Sets of Nonmonotonic Logic Programs
This paper studies compositional semantics of nonmonotonic logic programs. We suppose the answer set semantics of extended disjunctive programs and consider the following problem. ...
Chiaki Sakama, Katsumi Inoue
CCS
2005
ACM
15 years 9 months ago
Deciding security of protocols against off-line guessing attacks
We provide an effective procedure for deciding the existence of off-line guessing attacks on security protocols, for a bounded number of sessions. The procedure consists of a co...
Mathieu Baudet
ECSQARU
2005
Springer
15 years 9 months ago
Molecular Fragment Mining for Drug Discovery
The main task of drug discovery is to find novel bioactive molecules, i.e., chemical compounds that, for example, protect human cells against a virus. One way to support solving t...
Christian Borgelt, Michael R. Berthold, David E. P...
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
15 years 9 months ago
Optimizing Robustness While Generating Shared Secret Safe Primes
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...
Emil Ong, John Kubiatowicz