Sciweavers

679 search results - page 86 / 136
» Using decision problems in public key cryptography
Sort
View
BIS
2010
227views Business» more  BIS 2010»
15 years 2 months ago
Using SPARQL and SPIN for Data Quality Management on the Semantic Web
The quality of data is a key factor that determines the performance of information systems, in particular with regard (1) to the amount of exceptions in the execution of business p...
Christian Fürber, Martin Hepp
CASDMKM
2004
Springer
147views Data Mining» more  CASDMKM 2004»
15 years 6 months ago
Data Set Balancing
This paper conducts experiments with three skewed data sets, seeking to demonstrate problems when skewed data is used, and identifying counter problems when data is balanced. The b...
David L. Olson
CJ
2006
100views more  CJ 2006»
15 years 1 months ago
Deterministic Identity-Based Signatures for Partial Aggregation
Aggregate signatures are a useful primitive which allows to aggregate into a single and constant-length signature many signatures on different messages computed by different users...
Javier Herranz
DANCE
2002
IEEE
15 years 6 months ago
Experiences with Capsule-Based Active Networking
Active Networking adds programmability to the elements of the network, most aggressively by using programmable packets, or capsules. ANTS [1, 2] and PLANet [3, 4] are the most mat...
Michael W. Hicks, Jonathan T. Moore, David Wethera...
AAAI
2012
13 years 3 months ago
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic...
Carlos Sarraute, Olivier Buffet, Jörg Hoffman...