Sciweavers

686 search results - page 19 / 138
» On the General Applicability of Instruction-Set Randomizatio...
Sort
View
150
Voted
CASES
2003
ACM
15 years 8 months ago
AES and the cryptonite crypto processor
CRYPTONITE is a programmable processor tailored to the needs of crypto algorithms. The design of CRYPTONITE was based on an in-depth application analysis in which standard crypto ...
Dino Oliva, Rainer Buchty, Nevin Heintze
CCS
2005
ACM
15 years 9 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
JCB
2006
114views more  JCB 2006»
15 years 3 months ago
A General Modeling Strategy for Gene Regulatory Networks with Stochastic Dynamics
A stochastic genetic toggle switch model that consists of two identical, mutually repressive genes is built using the Gillespie algorithm with time delays as an example of a simpl...
Andre Ribeiro, Rui Zhu, Stuart A. Kauffman
142
Voted
KDD
2008
ACM
193views Data Mining» more  KDD 2008»
16 years 3 months ago
A family of dissimilarity measures between nodes generalizing both the shortest-path and the commute-time distances
This work introduces a new family of link-based dissimilarity measures between nodes of a weighted directed graph. This measure, called the randomized shortest-path (RSP) dissimil...
Luh Yen, Marco Saerens, Amin Mantrach, Masashi Shi...
118
Voted
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
16 years 3 months ago
Experiments with random projections for machine learning
Dimensionality reduction via Random Projections has attracted considerable attention in recent years. The approach has interesting theoretical underpinnings and offers computation...
Dmitriy Fradkin, David Madigan