Sciweavers

2542 search results - page 70 / 509
» One step ahead
Sort
View
ACL
2010
13 years 7 months ago
The Prevalence of Descriptive Referring Expressions in News and Narrative
Generating referring expressions is a key step in Natural Language Generation. Researchers have focused almost exclusively on generating distinctive referring expressions, that is...
Raquel Hervás, Mark A. Finlayson
IJNSEC
2010
138views more  IJNSEC 2010»
13 years 3 months ago
A Modified Hill Cipher Involving Interweaving and Iteration
This paper deals with a modification of the Hill cipher. In this, we have introduced interweaving in each step of the iteration. The interweaving of the resulting plaintext, at ea...
V. Umakanta Sastry, N. Ravi Shankar, S. Durga Bhav...
ASIACRYPT
2009
Springer
14 years 3 months ago
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
The design of cryptographic hash functions is a very complex and failure-prone process. For this reason, this paper puts forward a completely modular and fault-tolerant approach to...
Anja Lehmann, Stefano Tessaro
SSDBM
2006
IEEE
156views Database» more  SSDBM 2006»
14 years 3 months ago
On Data and Visualization Models for Signaling Pathways
Signaling pathways are chains of interacting proteins, through which the cell converts a (usually) extracellular signal into a biological response. The number of known signaling p...
Nattakarn Ratprasartporn, Ali Cakmak, Gultekin &Ou...
ESORICS
2004
Springer
14 years 2 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee