Sciweavers

503 search results - page 20 / 101
» If not now, when
Sort
View
HICSS
2011
IEEE
179views Biometrics» more  HICSS 2011»
13 years 2 months ago
EventGraphs: Charting Collections of Conference Connections
EventGraphs are social media network diagrams of conversations related to events, such as conferences. Many conferences now communicate a common “hashtag” or keyword to identi...
Derek L. Hansen, Marc A. Smith, Ben Shneiderman
EUROCRYPT
2009
Springer
14 years 11 months ago
Cube Attacks on Tweakable Black Box Polynomials
Almost any cryptographic scheme can be described by tweakable polynomials over GF(2), which contain both secret variables (e.g., key bits) and public variables (e.g., plaintext bit...
Itai Dinur, Adi Shamir
TSMC
2002
107views more  TSMC 2002»
13 years 10 months ago
Guaranteed robust nonlinear estimation with application to robot localization
When reliable prior bounds on the acceptable errors between the data and corresponding model outputs are available, bounded-error estimation techniques make it possible to characte...
Luc Jaulin, Michel Kieffer, Eric Walter, Dominique...
IFL
2007
Springer
141views Formal Methods» more  IFL 2007»
14 years 4 months ago
Partial Parsing: Combining Choice with Commitment
Abstract. Parser combinators, often monadic, are a venerable and widelyused solution to read data from some external format. However, the capability to return a partial parse has, ...
Malcolm Wallace
ICC
2007
IEEE
14 years 4 months ago
Reducing the Size of Rule Set in a Firewall
— A firewall’s complexity is known to increase with the size of its rule set. Complex firewalls are more likely to have configuration errors which cause security loopholes. ...
MyungKeun Yoon, Shigang Chen, Zhan Zhang