Sciweavers

3210 search results - page 107 / 642
» Secure Similarity Search
Sort
View
SIGCOMM
2010
ACM
15 years 5 months ago
How secure are secure interdomain routing protocols
In response to high-profile Internet outages, BGP security variants have been proposed to prevent the propagation of bogus routing information. To inform discussions of which vari...
Sharon Goldberg, Michael Schapira, Peter Hummon, J...
116
Voted
GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
15 years 8 months ago
Human competitive security protocols synthesis
This poster paper outlines a method for a search based approach to the development of provably correct protocols. Categories and Subject Descriptors C.2.2 [Computer Communication ...
Hao Chen, John A. Clark, Jeremy Jacob
177
Voted
CG
2006
Springer
15 years 8 months ago
A Skat Player Based on Monte-Carlo Simulation
We apply Monte Carlo simulation and alpha-beta search to the card game of Skat, which is similar to Bridge, but different enough to require some new algorithmic ideas besides the t...
Sebastian Kupferschmid, Malte Helmert
DASFAA
2009
IEEE
118views Database» more  DASFAA 2009»
15 years 11 months ago
Periodic Pattern Analysis in Time Series Databases
Similarity search in time series data is used in diverse domains. The most prominent work has focused on similarity search considering either complete time series or certain subseq...
Johannes Aßfalg, Thomas Bernecker, Hans-Pete...
139
Voted
NAR
2000
123views more  NAR 2000»
15 years 4 months ago
The Protein Information Resource (PIR)
The Protein Information Resource (PIR) produces the largest, most comprehensive, annotated protein sequence database in the public domain, the PIRInternational Protein Sequence Da...
Winona C. Barker, John S. Garavelli, Hongzhan Huan...