Sciweavers

6224 search results - page 1092 / 1245
» Recent Advances in Networking
Sort
View
CCS
2009
ACM
16 years 4 months ago
Towards complete node enumeration in a peer-to-peer botnet
Modern advanced botnets may employ a decentralized peer-to-peer overlay network to bootstrap and maintain their command and control channels, making them more resilient to traditi...
Brent ByungHoon Kang, Eric Chan-Tin, Christopher P...
FCT
2009
Springer
15 years 10 months ago
Competitive Group Testing and Learning Hidden Vertex Covers with Minimum Adaptivity
Suppose that we are given a set of n elements d of which are “defective”. A group test can check for any subset, called a pool, whether it contains a defective. It is well know...
Peter Damaschke, Azam Sheikh Muhammad
155
Voted
IJNSEC
2007
110views more  IJNSEC 2007»
15 years 4 months ago
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices
The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse...
Chetan Nanjunda Mathur, K. P. Subbalakshmi

Lecture Notes
1005views
17 years 4 months ago
Lectures on reconfigurable computing
Driven by recent innovations in Field-Programmable Gate Arrays (FPGAs), reconfigurable computing offers unique ways to accelerate key algorithms. FPGAs offer a programmable logic f...
Sherief Reda
153
Voted
CVPR
2009
IEEE
1390views Computer Vision» more  CVPR 2009»
16 years 11 months ago
Stacks of Convolutional Restricted Boltzmann Machines for Shift-Invariant Feature Learning
In this paper we present a method for learning classspecific features for recognition. Recently a greedy layerwise procedure was proposed to initialize weights of deep belief ne...
Mohammad Norouzi (Simon Fraser University), Mani R...
« Prev « First page 1092 / 1245 Last » Next »