Sciweavers

24 search results - page 4 / 5
» NESSIE: A European Approach to Evaluate Cryptographic Algori...
Sort
View
SIGIR
2010
ACM
13 years 6 months ago
Analysis of structural relationships for hierarchical cluster labeling
Cluster label quality is crucial for browsing topic hierarchies obtained via document clustering. Intuitively, the hierarchical structure should influence the labeling accuracy. H...
Markus Muhr, Roman Kern, Michael Granitzer
CLEF
2007
Springer
14 years 5 days ago
Domain-Specific IR for German, English and Russian Languages
In participating in this CLEF evaluation campaign, our first objective is to propose and evaluate various indexing and search strategies for the Russian language, in order to obta...
Claire Fautsch, Ljiljana Dolamic, Samir Abdou, Jac...
ISCA
2007
IEEE
167views Hardware» more  ISCA 2007»
14 years 9 days ago
New cache designs for thwarting software cache-based side channel attacks
Software cache-based side channel attacks are a serious new class of threats for computers. Unlike physical side channel attacks that mostly target embedded cryptographic devices,...
Zhenghong Wang, Ruby B. Lee
INFOCOM
2012
IEEE
11 years 8 months ago
Location privacy preservation in collaborative spectrum sensing
—Collaborative spectrum sensing has been regarded as a promising approach to enable secondary users to detect primary users by exploiting spatial diversity. In this paper, we con...
Shuai Li, Haojin Zhu, Zhaoyu Gao, Xinping Guan, Ka...
GI
2004
Springer
13 years 11 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner