Sciweavers

625 search results - page 31 / 125
» Generalized Ring Signatures
Sort
View
TIT
2010
80views Education» more  TIT 2010»
13 years 2 months ago
Optical orthogonal signature pattern codes with maximum collision parameter 2 and weight 4
An optical orthogonal signature pattern code (OOSPC) finds application in transmitting 2-dimensional images through multicore fiber in code-division multiple-access (CDMA) communic...
Masanori Sawa
IJON
2007
82views more  IJON 2007»
13 years 7 months ago
Inhibitory conductance dynamics in cortical neurons during activated states
During activated states in vivo, neocortical neurons are subject to intense synaptic activity and high-amplitude membrane potential ðVmÞ fluctuations. These ‘‘high-conducta...
Martin Pospischil, Zuzanna Piwkowska, Michelle Rud...
ENTCS
2008
114views more  ENTCS 2008»
13 years 7 months ago
Term-graph Rewriting in Tom Using Relative Positions
In this paper, we present the implementation in Tom of a de Bruijn indices generalization allowing the representation of term-graphs over an algebraic signature. By adding pattern...
Emilie Balland, Paul Brauner
CCS
2003
ACM
14 years 23 days ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
ACSAC
2008
IEEE
14 years 2 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh