Sciweavers

2750 search results - page 521 / 550
» The complexity of learning SUBSEQ(A)
Sort
View
LCPC
2007
Springer
15 years 5 months ago
Modeling Relations between Inputs and Dynamic Behavior for General Programs
Program dynamic optimization, adaptive to runtime behavior changes, has become increasingly important for both performance and energy savings. However, most runtime optimizations o...
Xipeng Shen, Feng Mao
TCC
2007
Springer
86views Cryptology» more  TCC 2007»
15 years 5 months ago
Weakly-Private Secret Sharing Schemes
Abstract. Secret-sharing schemes are an important tool in cryptography that is used in the construction of many secure protocols. However, the shares’ size in the best known secr...
Amos Beimel, Matthew K. Franklin
VIZSEC
2007
Springer
15 years 5 months ago
An Interactive Attack Graph Cascade and Reachability Display
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
Leevar Williams, Richard Lippmann, Kyle Ingols
VLDB
2007
ACM
137views Database» more  VLDB 2007»
15 years 5 months ago
Detecting Attribute Dependencies from Query Feedback
Real-world datasets exhibit a complex dependency structure among the data attributes. Learning this structure is a key task in automatic statistics configuration for query optimi...
Peter J. Haas, Fabian Hueske, Volker Markl
IJCNN
2006
IEEE
15 years 5 months ago
Venn-like models of neo-cortex patches
— This work presents a new architecture of artificial neural networks – Venn Networks, which produce localized activations in a 2D map while executing simple cognitive tasks. T...
Fernando Buarque de Lima Neto, Philippe De Wilde