Results 1 - 10
of
132
Proceedings of the Second International Conference on Machine Learning and Cybernetics, Xi’an, 2-5 November 2003 HYBRID NEURAL NETWORK AND C4.5 FOR MISUSE DETECTION
"... Intrusion detection technology is an effective approach to dealing with the problems of network security. In this paper, we present an intrusion detection model based on hybrid neural network and C4.5.The key idea is to take advantage of different classification abilities of neural network and the C ..."
Abstract
- Add to MetaCart
and the C4.5 algorithm for different attacks. What is more, the model could also be updated by the C4.5 rules mined from the dataset after the event (intrusion). We employ data from the third international knowledge discovery and data mining tools competition (KDDcup’99) to train and test feasibility of our
AGR 05
"... Responses of soil biological processes to elevated atmospheric [CO2] and nitrogen addition in a poplar plantation ..."
Abstract
- Add to MetaCart
Responses of soil biological processes to elevated atmospheric [CO2] and nitrogen addition in a poplar plantation
TO CODE OR NOT TO CODE
, 2002
"... de nationalité suisse et originaire de Zurich (ZH) et Lucerne (LU) acceptée sur proposition du jury: ..."
Abstract
- Add to MetaCart
de nationalité suisse et originaire de Zurich (ZH) et Lucerne (LU) acceptée sur proposition du jury:
Universität Oldenburg, D-26111 OldenburgClimate Policy with Technology Transfers and Permit Trading
, 2011
"... In this paper, we analyze technology transfers (TT) and tradable emission rights, which are core issues of the ongoing climate negotiations. Subsidizing TT leads to the adoption of better abatement technologies in developing countries, thereby reducing the international permit price. This is benefic ..."
Abstract
- Add to MetaCart
In this paper, we analyze technology transfers (TT) and tradable emission rights, which are core issues of the ongoing climate negotiations. Subsidizing TT leads to the adoption of better abatement technologies in developing countries, thereby reducing the international permit price
An Infinite Set of Ward Identities for Adiabatic Modes in Cosmology
"... We show that the correlation functions of any single-field cosmological model with constant growing-modes are constrained by an infinite number of novel consistency relations, which relate N + 1-point correlation functions with a soft-momentum scalar or tensor mode to a symmetry transformation on N- ..."
Abstract
- Add to MetaCart
constrain — completely for n = 0, 1, and partially for n ≥ 2 — the qn behavior of the soft limits. The identities at n = 0 recover Maldacena’s original consistency relations for a soft scalar and tensor mode, n = 1 gives the recently-discovered conformal consistency relations, and the identities for n ≥ 2
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). In: Dwork
- CRYPTO 2006. LNCS,
, 2006
"... Abstract We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the mild Decision Linear complexity assumption in bilinear groups. The system is efficient and practical, with sm ..."
Abstract
-
Cited by 119 (10 self)
- Add to MetaCart
T for an identity Id ∈ Z × p works as follows. The algorithm chooses random exponents s, s 1 , s 2 ∈ Z p , and creates the ciphertext as: Decrypt(Pvk Id , C) The decryption algorithm attempts to decrypt a ciphertext CT by computing: Proving Security. We prove security using a hybrid experiment. Let [C , C 0 , C 1
unknown title
"... ACKNOWLEDGMENTS I would like to give many thanks to Dr. Shengli Fu and Dr. Yan Huang as my advi- ..."
Abstract
- Add to MetaCart
ACKNOWLEDGMENTS I would like to give many thanks to Dr. Shengli Fu and Dr. Yan Huang as my advi-
Results 1 - 10
of
132