Sciweavers

2995 search results - page 94 / 599
» On multi-avoidance of generalized patterns
Sort
View
ANSS
2004
IEEE
13 years 11 months ago
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications
Intruders often want to analyze traffic pattern to get information for his some malicious activities in ultra-secure network. This paper presents a general approach to prevent tra...
Dongxi Liu, Chi-Hung Chi, Ming Li
CCS
2008
ACM
13 years 9 months ago
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted...
Peter Williams, Radu Sion, Bogdan Carbunar
AMC
2007
134views more  AMC 2007»
13 years 8 months ago
An image fragile watermark scheme based on chaotic image pattern and pixel-pairs
Fragile watermarking techniques for digital content have been studied in the past few years. Fragile watermarks are used to determine if a piece of watermarked digital content has...
Shaohui Liu, Hongxun Yao, Wen Gao, Yongliang Liu
ML
2008
ACM
135views Machine Learning» more  ML 2008»
13 years 7 months ago
Compiling pattern matching to good decision trees
We address the issue of compiling ML pattern matching to compact and efficient decisions trees. Traditionally, compilation to decision trees is optimized by (1) implementing decis...
Luc Maranget
SIGMOD
2008
ACM
127views Database» more  SIGMOD 2008»
13 years 7 months ago
Minimization of tree pattern queries with constraints
Tree pattern queries (TPQs) provide a natural and easy formalism to query tree-structured XML data, and the efficient processing of such queries has attracted a lot of attention. ...
Ding Chen, Chee Yong Chan