Sciweavers

631 search results - page 116 / 127
» Supervised Peer-to-Peer Systems
Sort
View
RAID
2005
Springer
14 years 1 months ago
FLIPS: Hybrid Adaptive Intrusion Prevention
Intrusion detection systems are fundamentally passive and fail–open. Because their primary task is classification, they do nothing to prevent an attack from succeeding. An intru...
Michael E. Locasto, Ke Wang, Angelos D. Keromytis,...
CCS
2001
ACM
14 years 8 days ago
Practical forward secure group signature schemes
A group signature scheme allows a group member to sign messages anonymously on behalf of the group, while in case of a dispute, a designated entity can reveal the identity of a si...
Dawn Xiaodong Song
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
14 years 4 days ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
EKAW
2008
Springer
13 years 9 months ago
Learning Disjointness for Debugging Mappings between Lightweight Ontologies
Abstract. Dealing with heterogeneous ontologies by means of semantic mappings has become an important area of research and a number of systems for discovering mappings between onto...
Christian Meilicke, Johanna Völker, Heiner St...
TREC
2004
13 years 9 months ago
From the Texts to the Contexts They Contain: A Chain of Linguistic Treatments
The text-mining system we are building deals with the specific problem of identifying the instances of relevant concepts present in the texts. Therefore, our system relies on inte...
Ahmed Amrani, Jérôme Azé, Thom...