Sciweavers

2259 search results - page 214 / 452
» Separation and information hiding
Sort
View
ARITH
2005
IEEE
14 years 4 months ago
Fast Modular Reduction for Large Wordlengths via One Linear and One Cyclic Convolution
Abstract— Modular reduction is a fundamental operation in cryptographic systems. Most well known modular reduction methods including Barrett’s and Montgomery’s algorithms lev...
Dhananjay S. Phatak, Tom Goff
SOFTVIS
2005
ACM
14 years 4 months ago
CVSscan: visualization of code evolution
During the life cycle of a software system, the source code is changed many times. We study how developers can be enabled to get insight in these changes, in order to understand t...
Lucian Voinea, Alexandru Telea, Jarke J. van Wijk
MCS
2005
Springer
14 years 4 months ago
Mixture of Gaussian Processes for Combining Multiple Modalities
This paper describes a unified approach, based on Gaussian Processes, for achieving sensor fusion under the problematic conditions of missing channels and noisy labels. Under the ...
Ashish Kapoor, Hyungil Ahn, Rosalind W. Picard
RSFDGRC
2005
Springer
156views Data Mining» more  RSFDGRC 2005»
14 years 4 months ago
Intrusion Detection System Based on Multi-class SVM
In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Hansung Lee, Jiyoung Song, Daihee Park
ICFCA
2004
Springer
14 years 4 months ago
Modelling Tacit Knowledge via Questionnaire Data
The transfer of tacit knowledge is important in ensuring that an organisations most valuable assets do not walk out the door. While much controversy surrounds the definition of ta...
Peter Busch, Debbie Richards