Sciweavers

5722 search results - page 484 / 1145
» Security Function Interactions
Sort
View
TVCG
2010
153views more  TVCG 2010»
15 years 3 months ago
Hierarchical Aggregation for Information Visualization: Overview, Techniques, and Design Guidelines
—We present a model for building, visualizing, and interacting with multiscale representations of information visualization techniques using hierarchical aggregation. The motivat...
Niklas Elmqvist, Jean-Daniel Fekete
EMNLP
2011
14 years 4 months ago
Bootstrapping Semantic Parsers from Conversations
Conversations provide rich opportunities for interactive, continuous learning. When something goes wrong, a system can ask for clarification, rewording, or otherwise redirect the...
Yoav Artzi, Luke S. Zettlemoyer
ACISP
2009
Springer
15 years 11 months ago
Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure
Abstract. In this paper, we study GF-NLFSR, a Generalized Unbalanced Feistel Network (GUFN) which can be considered as an extension of the outer function FO of the KASUMI block cip...
Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui ...
CCS
2007
ACM
15 years 11 months ago
A simple and expressive semantic framework for policy composition in access control
In defining large, complex access control policies, one would like to compose sub-policies, perhaps authored by different organizations, into a single global policy. Existing po...
Glenn Bruns, Daniel S. Dantas, Michael Huth
ACISP
2009
Springer
15 years 11 months ago
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders
Abstract. Two of the most recent and powerful multi-property-preserving (MPP) hash domain extension transforms are the Ramdom-Oracle-XOR (ROX) transform and the Enveloped Shoup (ES...
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu