Sciweavers

766 search results - page 69 / 154
» How to Read a Signature
Sort
View
COMCOM
2007
98views more  COMCOM 2007»
13 years 9 months ago
Anomaly detection in TCP/IP networks using immune systems paradigm
The paper presents an architecture of an anomaly detection system based on the paradigm of artificial immune systems (AISs). Incoming network traffic data are considered by the s...
Franciszek Seredynski, Pascal Bouvry
ECCC
2007
185views more  ECCC 2007»
13 years 9 months ago
Trapdoors for Hard Lattices and New Cryptographic Constructions
We show how to construct a variety of “trapdoor” cryptographic tools assuming the worst-case hardness of standard lattice problems (such as approximating the length of the sho...
Craig Gentry, Chris Peikert, Vinod Vaikuntanathan
NECO
2008
116views more  NECO 2008»
13 years 8 months ago
A (Somewhat) New Solution to the Variable Binding Problem
To perform automatic, unconscious inference, the human brain must solve the "binding problem" by correctly grouping properties with objects. Temporal binding models like...
Leon Barrett, Jerome Feldman, Liam Mac Dermed
JSW
2007
141views more  JSW 2007»
13 years 8 months ago
Building Dependable and Secure Web Services
— Web Services offer great promise for integrating and automating software applications within and between enterprises over the Internet. However, ensuring that Web Services can ...
Louise E. Moser, P. Michael Melliar-Smith, Wenbing...
LPAR
2010
Springer
13 years 6 months ago
Disunification for Ultimately Periodic Interpretations
Abstract. Disunification is an extension of unification to first-order formulae over syntactic equality atoms. Instead of considering only syntactic equality, I extend a disunifica...
Matthias Horbach