Sciweavers

929 search results - page 138 / 186
» heuristics 2008
Sort
View
CCS
2009
ACM
14 years 3 months ago
Attacking cryptographic schemes based on "perturbation polynomials"
We show attacks on several cryptographic schemes that have recently been proposed for achieving various security goals in sensor networks. Roughly speaking, these schemes all use ...
Martin Albrecht, Craig Gentry, Shai Halevi, Jonath...
WIA
2009
Springer
14 years 3 months ago
Short Regular Expressions from Finite Automata: Empirical Results
We continue our work [H. Gruber, M. Holzer: Provably shorter regular expressions from deterministic finite automata (extended ). In Proc. DLT, LNCS 5257, 2008] on the problem of ...
Hermann Gruber, Markus Holzer, Michael Tautschnig
ACSAC
2008
IEEE
14 years 3 months ago
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies
Role hierarchies are fundamental to the role based access control (RBAC) model. The notion of role hierarchy is a well understood concept that allows senior roles to inherit the p...
Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri
AINA
2008
IEEE
14 years 3 months ago
A New Dynamic Wavelength Assignment Scheme in Wavelength-Convertible WBS Networks
—In the paper, we study the wavelength assignment problem in waveband switching (WBS) networks, which is composed of multi-granular optical cross-connect (MG-OXCs) interconnected...
Ching-Fang Hsu, Fang-Sheng Lin, Ke-Kuan Hsu
BIBM
2008
IEEE
145views Bioinformatics» more  BIBM 2008»
14 years 3 months ago
Meta Analysis of Microarray Data Using Gene Regulation Pathways
Using microarray technology for genetic analysis in biological experiments requires computationally intensive tools to interpret results. The main objective here is to develop a ...
Saira Ali Kazmi, Yoo-Ah Kim, Baikang Pei, Ravi Nor...