Sciweavers

1585 search results - page 27 / 317
» Automatically optimizing secure computation
Sort
View
COLING
2010
13 years 2 months ago
Automatic Discovery of Feature Sets for Dependency Parsing
This paper describes a search procedure to discover optimal feature sets for dependency parsers. The search applies to the shift
Peter Nilsson, Pierre Nugues
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
14 years 1 months ago
Using Replication and Partitioning to Build Secure Distributed Systems
A challenging unsolved security problem is how to specify and enforce system-wide security policies; this problem is even more acute in distributed systems with mutual distrust. T...
Lantian Zheng, Stephen Chong, Andrew C. Myers, Ste...
ISI
2006
Springer
13 years 7 months ago
Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects
Abstract. With recent advances in sensory and mobile computing technology, enormous amounts of data about moving objects are being collected. With such data, it becomes possible to...
Xiaolei Li, Jiawei Han, Sangkyum Kim
SEC
2000
13 years 9 months ago
Improving Packet Filters Management through Automatic and Dynamic Schemes
: The development of complex access control architectures raises the problem of their management. In this article, we describe an architecture providing packet filters configuratio...
Olivier Paul, Maryline Laurent
HPCC
2007
Springer
13 years 11 months ago
Checkpointing Aided Parallel Execution Model and Analysis
Abstract. Checkpointing techniques are usually used to secure the execution of sequential and parallel programs. However, they can also be used in order to generate automatically a...
Laura Mereuta, Éric Renault