Sciweavers

3657 search results - page 598 / 732
» A Study of Practical Deduplication
Sort
View
CIKM
2011
Springer
13 years 10 months ago
Emerging topic detection using dictionary learning
Streaming user-generated content in the form of blogs, microblogs, forums, and multimedia sharing sites, provides a rich source of data from which invaluable information and insig...
Shiva Prasad Kasiviswanathan, Prem Melville, Arind...
DB
2011
13 years 9 months ago
Open source software adoption: motivations of adopters and amotivations of non-adopters
Adoption of an information system could be reflected in two ways: through the adoption intentions of the non-adopters and the extent of adoption for the adopters. This study seeks...
Yan Li, Chuan-Hoo Tan, Heng Xu, Hock-Hai Teo
DSN
2011
IEEE
13 years 9 months ago
OS diversity for intrusion tolerance: Myth or reality?
—One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are ...
Miguel Garcia, Alysson Neves Bessani, Ilir Gashi, ...
IACR
2011
137views more  IACR 2011»
13 years 9 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...
IACR
2011
113views more  IACR 2011»
13 years 9 months ago
Fully Homomorphic SIMD Operations
At PKC 2010 Smart and Vercauteren presented a variant of Gentry’s fully homomorphic public key encryption scheme and mentioned that the scheme could support SIMD style operations...
Nigel P. Smart, Frederik Vercauteren