Sciweavers

923 search results - page 156 / 185
» Improved Slide Attacks
Sort
View
CEAS
2005
Springer
14 years 3 months ago
Email Task Management: An Iterative Relational Learning Approach
Today’s email clients were designed for yesterday’s email. Originally, email was merely a communication medium. Today, people engage in a variety of complex behaviours using e...
Rinat Khoussainov, Nicholas Kushmerick
ICN
2005
Springer
14 years 3 months ago
Securing Layer 2 in Local Area Networks
Abstract. Network security problems have been well known and addressed in the application, transport, or network layers. However, the Data Link Layer (Layer 2) security has not bee...
Hayriye Altunbasak, Sven Krasser, Henry L. Owen, J...
IPTPS
2005
Springer
14 years 3 months ago
A First Look at Peer-to-Peer Worms: Threats and Defenses
Abstract— Peer-to-peer (P2P) worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentially more effective strat...
Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole ...
ISMIR
2005
Springer
165views Music» more  ISMIR 2005»
14 years 3 months ago
Using a Pitch Detector for Onset Detection
A segmentation strategy is explored for monophonic instrumental pitched non-percussive material (PNP) which proceeds from the assertion that human-like event analysis can be found...
Nick Collins
IWINAC
2005
Springer
14 years 3 months ago
The Allele Meta-model - Developing a Common Language for Genetic Algorithms
Abstract. Due to the lot of different Genetic Algorithm variants, encodings, and attacked problems, very little general theory is available to explain the internal functioning of ...
Stefan Wagner 0002, Michael Affenzeller