Sciweavers

905 search results - page 116 / 181
» The Case Against Micropayments
Sort
View
SACRYPT
1998
Springer
257views Cryptology» more  SACRYPT 1998»
14 years 1 months ago
Cryptanalysis of RC4-like Ciphers
Abstract. RC4, a stream cipher designed by Rivest for RSA Data Security Inc., has found several commercial applications, but little public analysis has been done to date. In this p...
Serge Mister, Stafford E. Tavares
AUSAI
2009
Springer
14 years 1 months ago
Ensemble Approach for the Classification of Imbalanced Data
Ensembles are often capable of greater prediction accuracy than any of their individual members. As a consequence of the diversity between individual base-learners, an ensemble wil...
Vladimir Nikulin, Geoffrey J. McLachlan, Shu-Kay N...
CONEXT
2007
ACM
14 years 1 months ago
Do you know what you are generating?
Software-based traffic generators are commonly used in experimental research on computer networks. However, there are no much studies focusing on how such instruments are accurate...
Alberto Dainotti, Alessio Botta, Antonio Pescap&eg...
FC
2010
Springer
135views Cryptology» more  FC 2010»
14 years 1 months ago
Multichannel Protocols to Prevent Relay Attacks
A number of security systems, from Chip-and-PIN payment cards to contactless subway and train tokens, as well as secure localization systems, are vulnerable to relay attacks. Encry...
Frank Stajano, Ford-Long Wong, Bruce Christianson
EVOW
2009
Springer
14 years 1 months ago
A Hierarchical Classification Ant Colony Algorithm for Predicting Gene Ontology Terms
Abstract. This paper proposes a novel Ant Colony Optimisation algorithm for the hierarchical problem of predicting protein functions using the Gene Ontology (GO). The GO structure ...
Fernando E. B. Otero, Alex Alves Freitas, Colin G....