Sciweavers

268 search results - page 46 / 54
» A Statistical Attack on RC6
Sort
View
VLDB
1998
ACM
147views Database» more  VLDB 1998»
13 years 11 months ago
Scalable Techniques for Mining Causal Structures
Mining for association rules in market basket data has proved a fruitful areaof research. Measures such as conditional probability (confidence) and correlation have been used to i...
Craig Silverstein, Sergey Brin, Rajeev Motwani, Je...
ICIP
2006
IEEE
14 years 9 months ago
Fingerprint Liveness Detection Using Local Ridge Frequencies and Multiresolution Texture Analysis Techniques
It has been demonstrated that simple and inexpensive techniques are sufficient to spoof fingerprint scanners. Previously, effective use of physiological phenomenon of perspiration...
Aditya Abhyankar, Stephanie A. C. Schuckers
WWW
2004
ACM
14 years 8 months ago
Towards the composition of Ad Hoc B2B Applications: Semantics, Properties and Complexity Management
The goal is to build a general framework for ad hoc applications over large networks using semantics and complex systems analysis. The first part deals with semantics because appl...
Jaime Delgado, Rosa Gil, Zièd Choukair
EDBT
2008
ACM
95views Database» more  EDBT 2008»
14 years 7 months ago
Zerber: r-confidential indexing for distributed documents
To carry out work assignments, small groups distributed within a larger enterprise often need to share documents among themselves while shielding those documents from others'...
Sergej Zerr, Elena Demidova, Daniel Olmedilla, Wol...
PERCOM
2005
ACM
14 years 7 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...