Sciweavers

7055 search results - page 1342 / 1411
» Some New 4-Designs
Sort
View
NDSS
2000
IEEE
15 years 5 months ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
RSCTC
2000
Springer
185views Fuzzy Logic» more  RSCTC 2000»
15 years 5 months ago
A Comparison of Several Approaches to Missing Attribute Values in Data Mining
: In the paper nine different approaches to missing attribute values are presented and compared. Ten input data files were used to investigate the performance of the nine methods t...
Jerzy W. Grzymala-Busse, Ming Hu
RT
2000
Springer
15 years 5 months ago
Fast Global Illumination Including Specular Effects
Rapidly simulating global illumination, including diffuse and glossy light transport is a very difficult problem. Finite element or radiosity approaches can achieve interactive si...
Xavier Granier, George Drettakis, Bruce Walter
EUROCRYPT
1997
Springer
15 years 5 months ago
Oblivious Transfers and Privacy Amplification
Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-two string OT, a sender offers two strings, one of which the other party, called the receive...
Gilles Brassard, Claude Crépeau
SIGUCCS
2000
ACM
15 years 5 months ago
Developing and Implementing a Comprehensive Training and Incentive Program for Student Employees in Information Technology
Anyone who works with student employees knows that while it is often difficult to train sufficiently, it is of the utmost importance to have a qualified, knowledgeable staff. We w...
Jim Osborn
« Prev « First page 1342 / 1411 Last » Next »