• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 132
Next 10 →

Source–Channel Coding and Network Communication

by Paolo Minero, Sung Hoon Lim, Young-han Kim , 2014
"... ar ..."
Abstract - Add to MetaCart
Abstract not found

Proceedings of the Second International Conference on Machine Learning and Cybernetics, Xi’an, 2-5 November 2003 HYBRID NEURAL NETWORK AND C4.5 FOR MISUSE DETECTION

by Zhi-song Pan, Song-can Chen, Gen-bao Hu, Dao-qiang Zhang
"... Intrusion detection technology is an effective approach to dealing with the problems of network security. In this paper, we present an intrusion detection model based on hybrid neural network and C4.5.The key idea is to take advantage of different classification abilities of neural network and the C ..."
Abstract - Add to MetaCart
and the C4.5 algorithm for different attacks. What is more, the model could also be updated by the C4.5 rules mined from the dataset after the event (intrusion). We employ data from the third international knowledge discovery and data mining tools competition (KDDcup’99) to train and test feasibility of our

AGR 05

by Università Degli, Studi Della Tuscia, Dottorato Di Ricerca, Candidato Tutori, Alessandra Lagomarsino, Prof Paolo, De Angelis, Prof Stefano Grego, Prof Paolo, De Angelis
"... Responses of soil biological processes to elevated atmospheric [CO2] and nitrogen addition in a poplar plantation ..."
Abstract - Add to MetaCart
Responses of soil biological processes to elevated atmospheric [CO2] and nitrogen addition in a poplar plantation

TO CODE OR NOT TO CODE

by Présentée À La, Faculté Informatique, Et Communications, Section Des, Systèmes De Communication, Du Grade, De Docteur, Ès Sciences, Prof M. Vetterli, Prof B. Rimoldi, Prof R. Gallager, Prof A. Lapidoth, Prof J. Massey, Prof E. Telatar, Prof S. Verdú, Michael Gastpar, Amos Lapidoth, Jim Ma , 2002
"... de nationalité suisse et originaire de Zurich (ZH) et Lucerne (LU) acceptée sur proposition du jury: ..."
Abstract - Add to MetaCart
de nationalité suisse et originaire de Zurich (ZH) et Lucerne (LU) acceptée sur proposition du jury:

Universität Oldenburg, D-26111 OldenburgClimate Policy with Technology Transfers and Permit Trading

by Carsten Helm, Stefan Pichler, Carsten Helm, Stefan Pichler , 2011
"... In this paper, we analyze technology transfers (TT) and tradable emission rights, which are core issues of the ongoing climate negotiations. Subsidizing TT leads to the adoption of better abatement technologies in developing countries, thereby reducing the international permit price. This is benefic ..."
Abstract - Add to MetaCart
In this paper, we analyze technology transfers (TT) and tradable emission rights, which are core issues of the ongoing climate negotiations. Subsidizing TT leads to the adoption of better abatement technologies in developing countries, thereby reducing the international permit price

An Infinite Set of Ward Identities for Adiabatic Modes in Cosmology

by Kurt Hinterbichlera, Lam Huib, Justin Khouryc
"... We show that the correlation functions of any single-field cosmological model with constant growing-modes are constrained by an infinite number of novel consistency relations, which relate N + 1-point correlation functions with a soft-momentum scalar or tensor mode to a symmetry transformation on N- ..."
Abstract - Add to MetaCart
constrain — completely for n = 0, 1, and partially for n ≥ 2 — the qn behavior of the soft limits. The identities at n = 0 recover Maldacena’s original consistency relations for a soft scalar and tensor mode, n = 1 gives the recently-discovered conformal consistency relations, and the identities for n ≥ 2

Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). In: Dwork

by Xavier Boyen , Brent Waters - CRYPTO 2006. LNCS, , 2006
"... Abstract We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the mild Decision Linear complexity assumption in bilinear groups. The system is efficient and practical, with sm ..."
Abstract - Cited by 119 (10 self) - Add to MetaCart
T for an identity Id ∈ Z × p works as follows. The algorithm chooses random exponents s, s 1 , s 2 ∈ Z p , and creates the ciphertext as: Decrypt(Pvk Id , C) The decryption algorithm attempts to decrypt a ciphertext CT by computing: Proving Security. We prove security using a hybrid experiment. Let [C , C 0 , C 1

Composition du Jury

by Eric Chaumette, Cédric Richard, Professeur Universités, Yannick Berthoumieu, Professeur Universités, Pascal Chevalier Professeur, Pascal Larzabal, Professeur Universités
"... Caractérisation des problèmes conjoints de détection et d'estimation ..."
Abstract - Add to MetaCart
Caractérisation des problèmes conjoints de détection et d'estimation

unknown title

by unknown authors
"... ACKNOWLEDGMENTS I would like to give many thanks to Dr. Shengli Fu and Dr. Yan Huang as my advi- ..."
Abstract - Add to MetaCart
ACKNOWLEDGMENTS I would like to give many thanks to Dr. Shengli Fu and Dr. Yan Huang as my advi-

DOCTEUR EN SCIENCES

by Bhaskar Biswas, Bhaskar Biswas , 2010
"... Implementational aspects of code-based cryptography ..."
Abstract - Add to MetaCart
Implementational aspects of code-based cryptography
Next 10 →
Results 1 - 10 of 132
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University