Sciweavers

582 search results - page 17 / 117
» What Will Probably Happen
Sort
View
CARDIS
1998
Springer
110views Hardware» more  CARDIS 1998»
14 years 1 months ago
Reducing the Collision Probability of Alleged Comp128
Wagner, Goldberg and Briceno have recently published an attack [2] on what they believe to be Comp128, the GSM A3A8 authentication hash function [1]. Provided that the attacker has...
Helena Handschuh, Pascal Paillier
WSDM
2010
ACM
251views Data Mining» more  WSDM 2010»
14 years 6 months ago
Large Scale Query Log Analysis of Re-Finding
Although Web search engines are targeted towards helping people find new information, people regularly use them to re-find Web pages they have seen before. Researchers have noted ...
Jaime Teevan, Sarah K. Tyler
COCOON
2009
Springer
14 years 3 months ago
On Smoothed Analysis of Quicksort and Hoare's Find
We provide a smoothed analysis of Hoare’s find algorithm and we revisit the smoothed analysis of quicksort. Hoare’s find algorithm – often called quickselect – is an easy...
Mahmoud Fouz, Manfred Kufleitner, Bodo Manthey, Ni...
IWINAC
2005
Springer
14 years 2 months ago
MEPIDS: Multi-Expression Programming for Intrusion Detection System
Abstract. An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been ...
Crina Grosan, Ajith Abraham, Sang-Yong Han
IWDC
2004
Springer
120views Communications» more  IWDC 2004»
14 years 2 months ago
SCIDS: A Soft Computing Intrusion Detection System
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...