Sciweavers

1249 search results - page 219 / 250
» Limitations of the Even-Mansour Construction
Sort
View
ACSC
2009
IEEE
14 years 4 months ago
A ConceptLink Graph for Text Structure Mining
Most text mining methods are based on representing documents using a vector space model, commonly known as a bag of word model, where each document is modeled as a linear vector r...
Rowena Chau, Ah Chung Tsoi, Markus Hagenbuchner, V...
CCS
2009
ACM
14 years 4 months ago
False data injection attacks against state estimation in electric power grids
A power grid is a complex system connecting electric power generators to consumers through power transmission and distribution networks across a large geographical area. System mo...
Yao Liu, Michael K. Reiter, Peng Ning
ICC
2009
IEEE
120views Communications» more  ICC 2009»
14 years 4 months ago
Back-of-the-Envelope Computation of Throughput Distributions in CSMA Wireless Networks
— This paper presents a simple method for computing throughputs of links in a CSMA network. We call our method back-of-the-envelop (BoE) computation, because for many network con...
Soung Chang Liew, Caihong Kai, Jason Leung, Bill W...
SEMCO
2009
IEEE
14 years 4 months ago
LAIR: A Language for Automated Semantics-Aware Text Sanitization Based on Frame Semantics
—We present LAIR: A domain-specific language that enables users to specify actions to be taken upon meeting specific semantic frames in a text, in particular to rephrase and re...
Steffen Hedegaard, Søren Houen, Jakob Grue ...
WECWIS
2009
IEEE
104views ECommerce» more  WECWIS 2009»
14 years 4 months ago
Online Auctions: There Can Be Only One
—In recent years, the proliferation of the world wide web has lead to an increase in the number of public auctions on the internet. One of the characteristics of online auctions ...
Charu C. Aggarwal, Philip S. Yu