Sciweavers

761 search results - page 85 / 153
» Metadata Principles and Practicalities
Sort
View
TISSEC
2002
82views more  TISSEC 2002»
13 years 9 months ago
Trust management for IPsec
IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
Matt Blaze, John Ioannidis, Angelos D. Keromytis
ICASSP
2010
IEEE
13 years 8 months ago
A partially collapsed Gibbs sampler for parameters with local constraints
We consider Bayesian detection/classiï¬cation of discrete random parameters that are strongly dependent locally due to some deterministic local constraint. Based on the recently ...
Georg Kail, Jean-Yves Tourneret, Franz Hlawatsch, ...
VIROLOGY
2010
113views more  VIROLOGY 2010»
13 years 8 months ago
A general definition of malware
We propose a general, formal definition of the concept of malware (malicious software) as a single sentence in the language of a certain modal logic. Our definition al thanks to it...
Simon Kramer, Julian C. Bradfield
CORR
2011
Springer
185views Education» more  CORR 2011»
13 years 5 months ago
Large-Scale Collective Entity Matching
There have been several recent advancements in Machine Learning community on the Entity Matching (EM) problem. However, their lack of scalability has prevented them from being app...
Vibhor Rastogi, Nilesh N. Dalvi, Minos N. Garofala...
ECSCW
2011
12 years 9 months ago
Theories of Cognition in CSCW
There are many theories useful for framing CSCW research and they may in principle be irreducible to a single theory. CSCW research explores questions involving numerous distinctâ€...
Gerry Stahl