Sciweavers

852 search results - page 7 / 171
» Building a better NetFlow
Sort
View
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
12 years 10 months ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev
IWAN
2000
Springer
14 years 2 months ago
Two Rule-Based Building-Block Architectures for Policy-Based Network Control
Policy-based networks can be customized by users by injecting programs called policies into the network nodes. So if general-purpose functions can be specified in a policy-based ne...
Yasusi Kanada
AIED
2009
Springer
14 years 2 months ago
Can Virtual Human Build Rapport and Promote Learning?
Research show that teacher's nonverbal immediacy can have a positive impact on student's cognitive learning and affect [31]. This paper investigates the effectiveness of ...
Ning Wang, Jonathan Gratch
IWC
2007
100views more  IWC 2007»
13 years 10 months ago
Usefulness of VRML building models in a direction finding context
This paper describes an experiment which aims to examine the effectiveness and efficiency of a Virtual Reality Modelling Language (VRML) building model compared with equivalent ar...
Pietro Murano, Dino Mackey
PAKDD
2007
ACM
140views Data Mining» more  PAKDD 2007»
14 years 5 months ago
A Hybrid Multi-group Privacy-Preserving Approach for Building Decision Trees
In this paper, we study the privacy-preserving decision tree building problem on vertically partitioned data. We made two contributions. First, we propose a novel hybrid approach, ...
Zhouxuan Teng, Wenliang Du