Sciweavers

2125 search results - page 234 / 425
» Points with Type-2 Operations
Sort
View
APWEB
2006
Springer
15 years 8 months ago
An RDF Storage and Query Framework with Flexible Inference Strategy
In the Semantic Web, RDF (Resource Description Framework) and RDF Schema are commonly used to describe metadata. There are a great many RDF data in current web, therefore, efficien...
Wennan Shen, Yuzhong Qu
ASIACRYPT
2006
Springer
15 years 8 months ago
Improved Collision Search for SHA-0
At CRYPTO2005, Xiaoyun Wang, Hongbo Yu and Yiqun Lisa Yin proposed a collision attack on SHA-0 that could generate a collision with complexity 239 SHA-0 hash operations. Although t...
Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Ya...
CCS
2006
ACM
15 years 8 months ago
Time series modeling for IDS alert management
Intrusion detection systems create large amounts of alerts. Significant part of these alerts can be seen as background noise of an operational information system, and its quantity...
Jouni Viinikka, Hervé Debar, Ludovic M&eacu...
EUROMICRO
2004
IEEE
15 years 8 months ago
Handover in Mobile Communication Networks: Who is in Control Anyway?
The migration from 3rd generation mobile communication networks to 4th generation, purely IP-based networks leads to new chances, but also great risks for the traditional mobile n...
Frank A. Zdarsky, Jens B. Schmitt
LCPC
2000
Springer
15 years 7 months ago
Improving Offset Assignment for Embedded Processors
Embedded systems consisting of the application program ROM, RAM, the embedded processor core, and any custom hardware on a single wafer are becoming increasingly common in applicat...
Sunil Atri, J. Ramanujam, Mahmut T. Kandemir