Sciweavers

2421 search results - page 140 / 485
» Message from the Editor-in-Chief
Sort
View
NSDI
2008
14 years 21 days ago
Exploiting Machine Learning to Subvert Your Spam Filter
Using statistical machine learning for making security decisions introduces new vulnerabilities in large scale systems. This paper shows how an adversary can exploit statistical m...
Blaine Nelson, Marco Barreno, Fuching Jack Chi, An...
FSE
2008
Springer
141views Cryptology» more  FSE 2008»
13 years 12 months ago
Collisions for Step-Reduced SHA-256
In this article we find collisions for step-reduced SHA-256. We develop a differential that holds with high probability if the message satisfies certain conditions. We solve the eq...
Ivica Nikolic, Alex Biryukov
HCI
2007
13 years 11 months ago
Aspects of Augmented Social Cognition: Social Information Foraging and Social Search
In this paper, we summarized recent work in modeling how users socially forage and search for information. One way to bridge between different communities of users is to diversify ...
Ed Huai-hsin Chi, Peter Pirolli, Shyong K. Lam
UAI
2008
13 years 11 months ago
Cumulative distribution networks and the derivative-sum-product algorithm
We introduce a new type of graphical model called a `cumulative distribution network' (CDN), which expresses a joint cumulative distribution as a product of local functions. ...
Jim C. Huang, Brendan J. Frey
SODA
2004
ACM
91views Algorithms» more  SODA 2004»
13 years 11 months ago
Competitive analysis of organization networks or multicast acknowledgement: how much to wait?
We study, from the competitive analysis perspective, the trade off between communication cost and delay cost (or simply the sendor-wait dilemma) on a hierarchy (rooted tree). The p...
Carlos Brito, Elias Koutsoupias, Shailesh Vaya