Sciweavers

1017 search results - page 109 / 204
» A General Model for Authenticated Data Structures
Sort
View
MSWIM
2005
ACM
14 years 2 months ago
Cellular universal IP: a low delay mobility scheme based on universal IP addressing
The concept of care-of-address (CoA) is a major cause of excessive handoff delay in Mobile IPv6 for real time multimedia traffic. Many schemes eliminate the use of CoA at the micr...
Patrick P. Lam, Soung C. Liew, Jack Y. B. Lee
APVIS
2009
13 years 10 months ago
Visual support for the understanding of simulation processes
Current visualization systems are typically based on the concept of interactive post-processing. This decoupling of data visualization from the process of data generation offers a...
Andrea Unger, Heidrun Schumann
NIPS
2003
13 years 10 months ago
Clustering with the Connectivity Kernel
Clustering aims at extracting hidden structure in dataset. While the problem of finding compact clusters has been widely studied in the literature, extracting arbitrarily formed ...
Bernd Fischer, Volker Roth, Joachim M. Buhmann
APLAS
2010
ACM
13 years 9 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
ACL
2008
13 years 10 months ago
Exploiting Feature Hierarchy for Transfer Learning in Named Entity Recognition
We present a novel hierarchical prior structure for supervised transfer learning in named entity recognition, motivated by the common structure of feature spaces for this task acr...
Andrew Arnold, Ramesh Nallapati, William W. Cohen