Sciweavers

5722 search results - page 147 / 1145
» Security Function Interactions
Sort
View
FSE
2009
Springer
125views Cryptology» more  FSE 2009»
14 years 10 months ago
On the Security of Tandem-DM
Abstract. We provide the first proof of security for Tandem-DM, one of the oldest and most wellknown constructions for turning a blockcipher with n-bit blocklength and 2n-bit keyle...
Ewan Fleischmann, Michael Gorski, Stefan Lucks
GLOBECOM
2008
IEEE
14 years 4 months ago
A Novel Coalitional Game Model for Security Issues in Wireless Networks
—In this paper, we propose a novel coalitional game model for security issues in wireless networks. The model can be applied to not only mobile ad hoc networks but also wireless ...
Xiaoqi Li, Michael R. Lyu
KDD
2002
ACM
93views Data Mining» more  KDD 2002»
14 years 10 months ago
Interactive deduplication using active learning
Deduplication is a key operation in integrating data from multiple sources. The main challenge in this task is designing a function that can resolve when a pair of records refer t...
Sunita Sarawagi, Anuradha Bhamidipaty
NAR
2008
103views more  NAR 2008»
13 years 10 months ago
STITCH: interaction networks of chemicals and proteins
The knowledge about interactions between proteins and small molecules is essential for the understanding of molecular and cellular functions. However, information on such interact...
Michael Kuhn 0004, Christian von Mering, Monica Ca...
CVPR
2008
IEEE
15 years 2 days ago
Interactive image segmentation via minimization of quadratic energies on directed graphs
We propose a scheme to introduce directionality in the Random Walker algorithm for image segmentation. In particular, we extend the optimization framework of this algorithm to com...
Dheeraj Singaraju, Leo Grady, René Vidal