Sciweavers

1167 search results - page 40 / 234
» On the Evaluation of Entity Profiles
Sort
View
HICSS
2008
IEEE
136views Biometrics» more  HICSS 2008»
14 years 3 months ago
Skype Fingerprint
The wealth of data available about a person’s computer activity is immense. Digital forensic sciences have progressed such that tools are readily available to recover deleted da...
Ronald C. Dodge Jr.
CHES
2006
Springer
87views Cryptology» more  CHES 2006»
14 years 7 days ago
Templates vs. Stochastic Methods
Template Attacks and the Stochastic Model provide advanced methods for side channel cryptanalysis that make use of `a-priori' knowledge gained from a profiling step. For a sys...
Benedikt Gierlichs, Kerstin Lemke-Rust, Christof P...
CRYPTO
2006
Springer
125views Cryptology» more  CRYPTO 2006»
14 years 5 days ago
On the Higher Order Nonlinearities of Algebraic Immune Functions
Abstract. One of the most basic requirements concerning Boolean functions used in cryptosystems is that they must have high algebraic degrees. This simple criterion is not always w...
Claude Carlet
LREC
2010
169views Education» more  LREC 2010»
13 years 10 months ago
An Evaluation of Technologies for Knowledge Base Population
Previous content extraction evaluations have neglected to address problems which complicate the incorporation of extracted information into an existing knowledge base. Previous qu...
Paul McNamee, Hoa Trang Dang, Heather Simpson, Pat...
WS
2004
ACM
14 years 1 months ago
Trust evaluation in ad-hoc networks
Title of Thesis: DISTRIBUTED TRUST EVALUATION IN AD-HOC NETWORKS Georgios E. Theodorakopoulos, Master of Science, 2004 Thesis directed by: Professor John S. Baras Department of El...
George Theodorakopoulos, John S. Baras