Sciweavers

12194 search results - page 2311 / 2439
» Numberings Optimal for Learning
Sort
View
EUROCRYPT
2010
Springer
15 years 9 months ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
15 years 9 months ago
Intelligent file scoring system for malware detection from the gray list
Currently, the most significant line of defense against malware is anti-virus products which focus on authenticating valid software from a white list, blocking invalid software f...
Yanfang Ye, Tao Li, Qingshan Jiang, Zhixue Han, Li...
KDD
2009
ACM
230views Data Mining» more  KDD 2009»
15 years 9 months ago
Grouped graphical Granger modeling methods for temporal causal modeling
We develop and evaluate an approach to causal modeling based on time series data, collectively referred to as“grouped graphical Granger modeling methods.” Graphical Granger mo...
Aurelie C. Lozano, Naoki Abe, Yan Liu, Saharon Ros...
SIGCPR
1999
ACM
105views Hardware» more  SIGCPR 1999»
15 years 8 months ago
A university-based approach to the diffusion of knowledge management concepts and practice
This paper addresses the diffusion of Knowledge Management concepts, principles, and cases into university courses. Although we are now living in a world of gigabit transmission s...
Stephen Ruth, Jeffrey Theobald, Virgil Frizzell
HICSS
1999
IEEE
72views Biometrics» more  HICSS 1999»
15 years 8 months ago
Software Reliability as a Function of User Execution Patterns
Assessing the reliability of a software system has always been an elusive target. A program may work very well for a number of years and this same program may suddenly become quit...
John C. Munson, Sebastian G. Elbaum
« Prev « First page 2311 / 2439 Last » Next »