Sciweavers

2621 search results - page 354 / 525
» Generalized Algorithms for Constructing Statistical Language...
Sort
View
WWW
2005
ACM
14 years 10 months ago
Signing individual fragments of an RDF graph
Being able to determine the provenience of statements is a fundamental step in any SW trust modeling. We propose a methodology that allows signing of small groups of RDF statement...
Giovanni Tummarello, Christian Morbidoni, Paolo Pu...
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 9 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
IWCMC
2006
ACM
14 years 3 months ago
Security aspects of inter-satellite links using neural networks
This paper presents a neural network model for routing in the space segment of a Satellite Personal Communication System. At first, a proper energy function is constructed from th...
Peter P. Stavroulakis, Ioannis Dimou, Harilaos G. ...
EUROCRYPT
2004
Springer
14 years 2 months ago
Short Signatures Without Random Oracles
We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in g...
Dan Boneh, Xavier Boyen
GECCO
2005
Springer
119views Optimization» more  GECCO 2005»
14 years 2 months ago
A new evolutionary method for time series forecasting
This paper presents a new method — the Time-delay Added Evolutionary Forecasting (TAEF) method — for time series prediction which performs an evolutionary search of the minimu...
Tiago A. E. Ferreira, Germano C. Vasconcelos, Paul...