Sciweavers

1931 search results - page 343 / 387
» Why we blog
Sort
View
ROCAI
2004
Springer
14 years 3 months ago
Learning Mixtures of Localized Rules by Maximizing the Area Under the ROC Curve
We introduce a model class for statistical learning which is based on mixtures of propositional rules. In our mixture model, the weight of a rule is not uniform over the entire ins...
Tobias Sing, Niko Beerenwinkel, Thomas Lengauer
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
14 years 3 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
INFOCOM
2003
IEEE
14 years 3 months ago
MEDF - A Simple Scheduling Algorithm for Two Real-Time Transport Service Classes with Application in the UTRAN
— In this paper, we consider real-time speech traffic, real-time circuit-switched data (CSD) and non-real-time packetswitched data (PSD) in the UMTS Terrestrial Radio Access Net...
Michael Menth, Matthias Schmid, Herbert Heiss, Tho...
IWPC
2002
IEEE
14 years 2 months ago
Comprehension of Object-Oriented Software Cohesion: The Empirical Quagmire
It is a little over ten years since Chidamber and Kemerer's obje ct-oriented (OO) metric suite which included the Lack of Cohesion Of Methods (LCOM) metric was rst proposed 9...
Steve Counsell, Emilia Mendes, Stephen Swift
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
14 years 2 months ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux