Sciweavers

1222 search results - page 186 / 245
» Some Results on Directable Automata
Sort
View
ACMDIS
2006
ACM
15 years 4 months ago
Morphome: a constructive field study of proactive information technology in the home
This paper presents the main results of a three-year long field and design study of proactive information technology in the home. This technology uses sensors to track human activ...
Ilpo Koskinen, Kristo Kuusela, Katja Battarbee, An...
ACISP
2004
Springer
15 years 3 months ago
Theoretical Analysis of XL over Small Fields
Abstract. XL was first introduced to solve determined or overdetermined systems of equations over a finite field as an “algebraic attack” against multivariate cryptosystems....
Bo-Yin Yang, Jiun-Ming Chen
ESORICS
2004
Springer
15 years 3 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
SWAT
2004
Springer
120views Algorithms» more  SWAT 2004»
15 years 3 months ago
Matching Polyhedral Terrains Using Overlays of Envelopes
For a collection F of d-variate piecewise linear functions of overall combinatorial complexity n, the lower envelope E(F) of F is the pointwise minimum of these functions. The min...
Vladlen Koltun, Carola Wenk
VLDB
2004
ACM
120views Database» more  VLDB 2004»
15 years 3 months ago
Relational link-based ranking
Link analysis methods show that the interconnections between web pages have lots of valuable information. The link analysis methods are, however, inherently oriented towards analy...
Floris Geerts, Heikki Mannila, Evimaria Terzi