Sciweavers

1005 search results - page 88 / 201
» Practical Secure Function Evaluation
Sort
View
ACSAC
2000
IEEE
14 years 1 months ago
Two State-based Approaches to Program-based Anomaly Detection
This paper describes two recently developed intrusion detection algorithms, and gives experimental results on their performance. The algorithms detect anomalies in execution audit...
Christoph C. Michael, Anup K. Ghosh
CCE
2004
13 years 8 months ago
Balanced random interval arithmetic
The results of experimental testing of balanced random interval arithmetic with typical mathematical test functions and practical problem are presented and discussed. The possibili...
Julius Zilinskas, Ian David Lockhart Bogle
WETICE
2003
IEEE
14 years 2 months ago
Design and Implementation of Virtual Private Services
Large scale distributed applications such as electronic commerce and online marketplaces combine network access with multiple storage and computational elements. The distributed r...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
IADIS
2004
13 years 10 months ago
Addressing the Effective Use of Learning Objects Through Teacher Education
This paper describes the development and evaluation of a curriculum designed to help teachers learn about and integrate digital library functionalities and learning objects into t...
Mimi Recker
AAAI
2000
13 years 10 months ago
Generalizing Boundary Points
The complexity of numerical domain partitioning depends on the number of potential cut points. In multiway partitioning this dependency is often quadratic, even exponential. There...
Tapio Elomaa, Juho Rousu