Sciweavers

2079 search results - page 366 / 416
» Universality of random graphs
Sort
View
SACRYPT
2007
Springer
126views Cryptology» more  SACRYPT 2007»
15 years 6 months ago
Improved Side-Channel Collision Attacks on AES
Abstract. Side-channel collision attacks were proposed in [1] and applied to AES in [2]. These are based on detecting collisions in certain positions of the internal state after th...
Andrey Bogdanov
WAW
2007
Springer
120views Algorithms» more  WAW 2007»
15 years 6 months ago
Manipulation-Resistant Reputations Using Hitting Time
Popular reputation systems for linked networks can be manipulated by spammers who strategically place links. The reputation of node v is interpreted as the world’s opinion of v...
John E. Hopcroft, Daniel Sheldon
WEBI
2007
Springer
15 years 6 months ago
Blog Community Discovery and Evolution Based on Mutual Awareness Expansion
There are information needs involving costly decisions that cannot be efficiently satisfied through conventional web search engines. Alternately, community centric search can prov...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...
WOWMOM
2006
ACM
168views Multimedia» more  WOWMOM 2006»
15 years 5 months ago
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
Motivated by recent surfacing viruses that can spread over the air interfaces, in this paper, we investigate the potential disastrous threat of node compromise spreading in wirele...
Pradip De, Yonghe Liu, Sajal K. Das
CVPR
2010
IEEE
15 years 5 months ago
Neuron Geometry Extraction by Perceptual Grouping in ssTEM images
In the field of neuroanatomy, automatic segmentation of electron microscopy images is becoming one of the main limiting factors in getting new insights into the functional struct...
Verena Kaynig, Thomas Fuchs, Joachim Buhmann