Sciweavers

20573 search results - page 3940 / 4115
» The Computer's New Clothes
Sort
View
TCC
2007
Springer
142views Cryptology» more  TCC 2007»
14 years 4 months ago
On Best-Possible Obfuscation
An obfuscator is a compiler that transforms any program (which we will view in this work as a boolean circuit) into an obfuscated program (also a circuit) that has the same input-...
Shafi Goldwasser, Guy N. Rothblum
VLDB
2007
ACM
137views Database» more  VLDB 2007»
14 years 4 months ago
Detecting Attribute Dependencies from Query Feedback
Real-world datasets exhibit a complex dependency structure among the data attributes. Learning this structure is a key task in automatic statistics configuration for query optimi...
Peter J. Haas, Fabian Hueske, Volker Markl
ANSS
2006
IEEE
14 years 4 months ago
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems
Anomaly detection systems largely depend on user profile data to be able to detect deviation from normal activity. Most of this profile data is based on commands executed by use...
Ashish Garg, Vidyaraman Sankaranarayanan, Shambhu ...
BROADNETS
2006
IEEE
14 years 4 months ago
CAM-MAC: A Cooperative Asynchronous Multi-Channel MAC Protocol for Ad Hoc Networks
— Medium access control (MAC) protocols have been studied under different contexts for several years now. In all these MAC protocols, nodes make independent decisions on when to ...
Tie Luo, Mehul Motani, Vikram Srinivasan
CGO
2006
IEEE
14 years 4 months ago
Region Monitoring for Local Phase Detection in Dynamic Optimization Systems
Dynamic optimization relies on phase detection for two important functions (1) To detect change in code working set and (2) To detect change in performance characteristics that ca...
Abhinav Das, Jiwei Lu, Wei-Chung Hsu
« Prev « First page 3940 / 4115 Last » Next »