Sciweavers

364 search results - page 68 / 73
» Discovering Hidden Evidence
Sort
View
PLDI
2006
ACM
14 years 2 months ago
Precise alias analysis for static detection of web application vulnerabilities
The number and the importance of web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Kruegel, Engin Kirda
ASIACRYPT
2003
Springer
14 years 1 months ago
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes
Abstract. We study two closely related primitives: Broadcast Encryption and Key Predistribution Schemes (KPS). Broadcast Encryption allows a broadcaster to broadcast an encrypted m...
Nuttapong Attrapadung, Kazukuni Kobara, Hideki Ima...
ECAL
1999
Springer
14 years 26 days ago
A Generic Neutral Model for Quantitative Comparison of Genotypic Evolutionary Activity
We use a new general-purpose model of neutral evolution of genotypes to make quantitative comparisons of diversity and adaptive evolutionary activity as a function of mutation rate...
Andreas Rechtsteiner, Mark A. Bedau
IWANN
1999
Springer
14 years 25 days ago
Using Temporal Neighborhoods to Adapt Function Approximators in Reinforcement Learning
To avoid the curse of dimensionality, function approximators are used in reinforcement learning to learn value functions for individual states. In order to make better use of comp...
R. Matthew Kretchmar, Charles W. Anderson
HICSS
1997
IEEE
89views Biometrics» more  HICSS 1997»
14 years 24 days ago
Text Types in Hypermedia
The discipline of narratology has long recognized the need to classify documents as instances of different text types. We have discovered that classification is as applicable to h...
Stephen W. Smoliar, James D. Baker