Sciweavers

3657 search results - page 534 / 732
» A Study of Practical Deduplication
Sort
View
FDTC
2008
Springer
87views Cryptology» more  FDTC 2008»
15 years 7 months ago
Silicon-level Solutions to Counteract Passive and Active Attacks
This article presents a family of cryptographic ASICs, called SecMat, designed in CMOS 130 nanometer technology by the authors with the help of STMicroelectronics. The purpose of ...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
IE
2007
15 years 7 months ago
Citizenship and consumption: convergence culture, transmedia narratives and the digital divide
Henry Jenkins’ recent publications on convergence have focused on the way that the active audience, equipped with the productive and distributive tools of digital technology mig...
Thomas Apperley
IE
2007
15 years 7 months ago
Implementation and evaluation of a background music reactive game
This paper discusses further work on the authors’ “background music reactive games” concept, where background music is used to modify video game parameters and thus actions ...
Khalid Aallouche, Homam Albeiriss, Redouane Zargho...
IMC
2007
ACM
15 years 7 months ago
A data streaming algorithm for estimating entropies of od flows
Entropy has recently gained considerable significance as an important metric for network measurement. Previous research has shown its utility in clustering traffic and detecting ...
Haiquan (Chuck) Zhao, Ashwin Lall, Mitsunori Ogiha...
CATS
2007
15 years 6 months ago
On The Complexity of Manipulating Elections
We study the manipulation of voting schemes, where a voter lies about their preferences in the hope of improving the election’s outcome. All voting schemes are potentially manip...
Tom Coleman, Vanessa Teague