Sciweavers

580 search results - page 8 / 116
» Studying the History of Ideas Using Topic Models
Sort
View
AFRICACRYPT
2008
Springer
14 years 1 months ago
A Brief History of Provably-Secure Public-Key Encryption
Public-key encryption schemes are a useful and interesting field of cryptographic study. The ultimate goal for the cryptographer in the field of public-key encryption would be th...
Alexander W. Dent
ISSRE
2010
IEEE
13 years 5 months ago
Security Trend Analysis with CVE Topic Models
—We study the vulnerability reports in the Common Vulnerability and Exposures (CVE) database by using topic models on their description texts to find prevalent vulnerability typ...
Stephan Neuhaus, Thomas Zimmermann
DBKDA
2009
IEEE
88views Database» more  DBKDA 2009»
13 years 10 months ago
Replay the Execution History of Rule-Based Information
Software systems in health care, such as disease and medical-record management, or financial applications, such as customer relationship and portfolio management, have very often...
Essam Mansour, Hagen Höpfner
SODA
2004
ACM
82views Algorithms» more  SODA 2004»
13 years 8 months ago
Dynamizing static algorithms, with applications to dynamic trees and history independence
We describe a machine model for automatically dynamizing static algorithms and apply it to historyindependent data structures. Static programs expressed in this model are dynamize...
Umut A. Acar, Guy E. Blelloch, Robert Harper, Jorg...
WWW
2011
ACM
13 years 2 months ago
Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on twitte
There is a widespread intuitive sense that different kinds of information spread differently on-line, but it has been difficult to evaluate this question quantitatively since it ...
Daniel M. Romero, Brendan Meeder, Jon M. Kleinberg