Sciweavers

808 search results - page 138 / 162
» Consistent digital rays
Sort
View
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
14 years 29 days ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
DRM
2005
Springer
14 years 28 days ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...
GECCO
2005
Springer
141views Optimization» more  GECCO 2005»
14 years 28 days ago
Constructing good learners using evolved pattern generators
Self-organization of brain areas in animals begins prenatally, evidently driven by spontaneously generated internal patterns. The neural structures continue to develop postnatally...
Vinod K. Valsalam, James A. Bednar, Risto Miikkula...
KDD
2005
ACM
177views Data Mining» more  KDD 2005»
14 years 27 days ago
Combining partitions by probabilistic label aggregation
Data clustering represents an important tool in exploratory data analysis. The lack of objective criteria render model selection as well as the identification of robust solutions...
Tilman Lange, Joachim M. Buhmann
KDD
2005
ACM
149views Data Mining» more  KDD 2005»
14 years 27 days ago
A distributed learning framework for heterogeneous data sources
We present a probabilistic model-based framework for distributed learning that takes into account privacy restrictions and is applicable to scenarios where the different sites ha...
Srujana Merugu, Joydeep Ghosh