Sciweavers

686 search results - page 20 / 138
» On the General Applicability of Instruction-Set Randomizatio...
Sort
View
VLSISP
2008
173views more  VLSISP 2008»
15 years 3 months ago
Fast Bit Gather, Bit Scatter and Bit Permutation Instructions for Commodity Microprocessors
Advanced bit manipulation operations are not efficiently supported by commodity word-oriented microprocessors. Programming tricks are typically devised to shorten the long sequence...
Yedidya Hilewitz, Ruby B. Lee
ALGORITHMICA
2006
84views more  ALGORITHMICA 2006»
15 years 3 months ago
Large Deviations for the Weighted Height of an Extended Class of Trees
We use large deviations to prove a general theorem on the asymptotic edge-weighted height Hn of a large class of random trees for which Hn c log n for some positive constant c. A...
Nicolas Broutin, Luc Devroye
KDD
2004
ACM
159views Data Mining» more  KDD 2004»
15 years 8 months ago
Optimal randomization for privacy preserving data mining
Randomization is an economical and efficient approach for privacy preserving data mining (PPDM). In order to guarantee the performance of data mining and the protection of individ...
Michael Yu Zhu, Lei Liu
127
Voted
RAID
2005
Springer
15 years 9 months ago
FLIPS: Hybrid Adaptive Intrusion Prevention
Intrusion detection systems are fundamentally passive and fail–open. Because their primary task is classification, they do nothing to prevent an attack from succeeding. An intru...
Michael E. Locasto, Ke Wang, Angelos D. Keromytis,...
110
Voted
ICTAI
1996
IEEE
15 years 7 months ago
Order in Space: A General Formalism for Spatial Reasoning
In this paper we propose a general approach for reasoning in space. The approach is composed of a set of two general constraints to govern the spatial relationships between object...
Baher A. El-Geresy, Alia I. Abdelmoty