Sciweavers

1146 search results - page 100 / 230
» Finite cupping sets
Sort
View
ICDCS
2009
IEEE
14 years 7 months ago
Characterization and Solution to a Stateful IDS Evasion
We identify a new type of stateful IDS evasion, named signature evasion. We formalize the signature evasion on those Stateful IDSs whose state can be modeled using Deterministic F...
Issam Aib, Tung Tran, Raouf Boutaba
FDTC
2006
Springer
120views Cryptology» more  FDTC 2006»
14 years 1 months ago
Blinded Fault Resistant Exponentiation
As the core operation of many public key cryptosystems, group exponentiation is central to cryptography. Attacks on its implementation in embedded device setting is hence of great ...
Guillaume Fumaroli, David Vigilant
COMPGEOM
2008
ACM
13 years 12 months ago
Tighter bounds for random projections of manifolds
The Johnson-Lindenstrauss random projection lemma gives a simple way to reduce the dimensionality of a set of points while approximately preserving their pairwise distances. The m...
Kenneth L. Clarkson
CORR
2010
Springer
126views Education» more  CORR 2010»
13 years 10 months ago
Asymptotic Traffic Flow in an Hyperbolic Network I: Definition and Properties of the Core
In this work we study the asymptotic traffic behaviour for Gromov's hyperbolic networks as the size of the network increases. We prove that under certain mild hypothesis the t...
Yuliy Baryshnikov, Gabriel H. Tucci
DM
2008
97views more  DM 2008»
13 years 10 months ago
On uniquely k-determined permutations
Motivated by a new point of view to study occurrences of consecutive patterns in permutations, we introduce the notion of uniquely k-determined permutations. We give two criteria f...
Sergey V. Avgustinovich, Sergey Kitaev