Sciweavers

548 search results - page 91 / 110
» Secure peer sampling
Sort
View
ACSAC
2002
IEEE
15 years 5 months ago
GOSSIB vs. IP Traceback Rumors
Abstract—To identify sources of distributed denial-of-service attacks, path traceback mechanisms have been proposed. Traceback mechanisms relying on probabilistic packet marking ...
Marcel Waldvogel
91
Voted
AGENTS
2000
Springer
15 years 4 months ago
A comparison of coordinated planning methods for cooperating rovers
This paper describes and evaluates three methods for coordinating multiple agents. These agents interact in two ways. First, they are able to work together to achieve a common poo...
Steve A. Chien, Anthony Barrett, Tara A. Estlin, G...
103
Voted
ISI
2007
Springer
15 years 11 days ago
Host Based Intrusion Detection using Machine Learning
—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instan...
Robert Moskovitch, Shay Pluderman, Ido Gus, Dima S...
94
Voted
SPEECH
2011
14 years 7 months ago
Intelligibility predictors and neural representation of speech
Intelligibility predictors tell us a great deal about human speech perception, in particular which acoustic factors strongly effect human behavior, and which do not. A particular...
Bryce E. Lobdell, Jont B. Allen, Mark Hasegawa-Joh...
106
Voted
IACR
2011
136views more  IACR 2011»
14 years 3 days ago
Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller
We give new methods for generating and using “strong trapdoors” in cryptographic lattices, which are simultaneously simple, efficient, easy to implement (even in parallel), a...
Daniele Micciancio, Chris Peikert