Sciweavers

1094 search results - page 141 / 219
» List signature schemes
Sort
View
CP
2006
Springer
13 years 9 months ago
Graph Properties Based Filtering
Abstract. This report presents a generic filtering scheme, based on the graph description of global constraints. This description is defined by a network of binary constraints and ...
Nicolas Beldiceanu, Mats Carlsson, Sophie Demassey...
JGTOOLS
2008
53views more  JGTOOLS 2008»
13 years 7 months ago
Query Sphere Indexing for Neighborhood Requests
This is an algorithm for finding neighbors for point objects that can freely move and have no predefined position. The query sphere consists of a center location and a given radiu...
Nicolas Brodu
PVLDB
2008
138views more  PVLDB 2008»
13 years 7 months ago
Authenticating the query results of text search engines
The number of successful attacks on the Internet shows that it is very difficult to guarantee the security of online search engines. A breached server that is not detected in time...
HweeHwa Pang, Kyriakos Mouratidis
CORR
2011
Springer
201views Education» more  CORR 2011»
12 years 11 months ago
An Achievable Rate Region for the Broadcast Channel with Feedback
A single-letter achievable rate region is proposed for the two-receiver discrete memoryless broadcast channel with noiseless or noisy feedback. The coding strategy involves block-...
Ramji Venkataramanan, S. Sandeep Pradhan
SIGCOMM
2006
ACM
14 years 1 months ago
Detecting evasion attacks at high speeds without reassembly
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
George Varghese, J. Andrew Fingerhut, Flavio Bonom...