Sciweavers

203 search results - page 14 / 41
» The Good, the Bad, and the Ugly
Sort
View
CCS
2010
ACM
15 years 1 months ago
On the (in)security of IPsec in MAC-then-encrypt configurations
IPsec allows a huge amount of flexibility in the ways in which its component cryptographic mechanisms can be combined to build a secure communications service. This may be good fo...
Jean Paul Degabriele, Kenneth G. Paterson
MTA
2002
166views more  MTA 2002»
15 years 27 days ago
MUSE: A Content-Based Image Search and Retrieval System Using Relevance Feedback
ThefieldofContent-BasedVisualInformationRetrieval(CBVIR)hasexperiencedtremendousgrowth in the recent years and many research groups are currently working on solutions to the proble...
Oge Marques, Borko Furht
ACL
2010
14 years 11 months ago
TrustRank: Inducing Trust in Automatic Translations via Ranking
The adoption of Machine Translation technology for commercial applications is hampered by the lack of trust associated with machine-translated output. In this paper, we describe T...
Radu Soricut, Abdessamad Echihabi
EVOW
2009
Springer
14 years 11 months ago
Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming
An ever-present problem in intrusion detection technology is how to construct the patterns of (good, bad or anomalous) behaviour upon which an engine have to make decisions regardi...
Agustín Orfila, Juan M. Estévez-Tapi...
MST
2006
149views more  MST 2006»
15 years 1 months ago
Parameterized Intractability of Distinguishing Substring Selection
A central question in computational biology is the design of genetic markers to distinguish between two given sets of (DNA) sequences. This question is formalized as the NP-comple...
Jens Gramm, Jiong Guo, Rolf Niedermeier