Sciweavers

10435 search results - page 287 / 2087
» Measuring system normality
Sort
View
JSAC
2006
137views more  JSAC 2006»
15 years 2 months ago
Adaptive Defense Against Various Network Attacks
In defending against various network attacks, such as distributed denial-of-service (DDoS) attacks or worm attacks, a defense system needs to deal with various network conditions a...
Cliff Changchun Zou, Nick G. Duffield, Donald F. T...
125
Voted
CACM
2000
186views more  CACM 2000»
15 years 2 months ago
Automatic personalization based on Web usage mining
One important class of Data Mining applications is the so-called "Web Mining" that analyzes and extracts important and non-trivial knowledge from Web related data. Typic...
Bamshad Mobasher, Robert Cooley, Jaideep Srivastav...
CRYPTO
2009
Springer
172views Cryptology» more  CRYPTO 2009»
15 years 9 months ago
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Brent Waters
121
Voted
CSL
2003
Springer
15 years 7 months ago
A Logic for Probability in Quantum Systems
Quantum computation deals with projective measurements and unitary transformations in finite dimensional Hilbert spaces. The paper presents a propositional logic designed to descr...
Ron van der Meyden, Manas Patra
134
Voted
ICRA
2002
IEEE
146views Robotics» more  ICRA 2002»
15 years 7 months ago
Topological Mobile Robot Localization using Fast Vision Techniques
In this paper we present a system for topologically localizing a mobile robot using color histogram matching of omnidirectional images. The system is intended for use as a navigat...
Paul Blaer, Peter K. Allen