Sciweavers

3020 search results - page 519 / 604
» Type Analysis of Prolog Using Type Graphs
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
URCA: Pulling out Anomalies by their Root Causes
—Traffic anomaly detection has received a lot of attention over recent years, but understanding the nature of these anomalies and identifying the flows involved is still a manu...
Fernando Silveira, Christophe Diot
SCN
2010
Springer
145views Communications» more  SCN 2010»
13 years 7 months ago
Distributed Private-Key Generators for Identity-Based Cryptography
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
Aniket Kate, Ian Goldberg
VTC
2010
IEEE
145views Communications» more  VTC 2010»
13 years 7 months ago
Performance of Multihop Wireless Links over Generalized-K Fading Channels
— The performance of multihop links is studied in this contribution by both analysis and simulations, when communicating over Generalized-K (KG) fading channels. The performance ...
Jianfei Cao, Lie-Liang Yang, Zhangdui Zhong
CCS
2010
ACM
13 years 7 months ago
Platform-independent programs
Given a single program (i.e., bit string), one may assume that the program's behaviors can be determined by first identifying the native runtime architecture and then executi...
Sang Kil Cha, Brian Pak, David Brumley, Richard Ja...
SIGDIAL
2010
13 years 6 months ago
Towards an Empirically Motivated Typology of Follow-Up Questions: The Role of Dialogue Context
A central problem in Interactive Question Answering (IQA) is how to answer Follow-Up Questions (FU Qs), possibly by taking advantage of information from the dialogue context. We a...
Manuel Kirschner, Raffaella Bernardi