Sciweavers

858 search results - page 5 / 172
» One Is Enough!
Sort
View
ESORICS
2008
Springer
13 years 9 months ago
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough
The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP...
Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X...
ASIACRYPT
2010
Springer
13 years 5 months ago
The World Is Not Enough: Another Look on Second-Order DPA
In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysi...
François-Xavier Standaert, Nicolas Veyrat-C...
CHI
2002
ACM
14 years 8 months ago
Out of many, one: reliable results from unreliable recognition
Recognition technologies such as speech recognition and optical recognition are still, by themselves. not reliable enough for many practical uses in user interfaces However, by co...
Henry Lieberman
NAACL
2010
13 years 5 months ago
Two monolingual parses are better than one (synchronous parse)
We describe a synchronous parsing algorithm that is based on two successive monolingual parses of an input sentence pair. Although the worst-case complexity of this algorithm is a...
Chris Dyer
GECCO
2004
Springer
124views Optimization» more  GECCO 2004»
14 years 1 months ago
A Statistical Model of GA Dynamics for the OneMax Problem
A model of the dynamics of solving the counting-ones (OneMax) problem using a simple genetic algorithm (GA) is developed. It uses statistics of the early generations of GA runs to ...
Bulent Buyukbozkirli, Erik D. Goodman