Sciweavers

8125 search results - page 1589 / 1625
» Adaptable and Adaptive Hypermedia Systems
Sort
View
PKC
2004
Springer
106views Cryptology» more  PKC 2004»
15 years 7 months ago
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features ...
Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, H...
VLDB
2004
ACM
120views Database» more  VLDB 2004»
15 years 7 months ago
Merging the Results of Approximate Match Operations
Data Cleaning is an important process that has been at the center of research interest in recent years. An important end goal of effective data cleaning is to identify the relatio...
Sudipto Guha, Nick Koudas, Amit Marathe, Divesh Sr...
VLDB
2004
ACM
163views Database» more  VLDB 2004»
15 years 7 months ago
Compressing Large Boolean Matrices using Reordering Techniques
Large boolean matrices are a basic representational unit in a variety of applications, with some notable examples being interactive visualization systems, mining large graph struc...
David S. Johnson, Shankar Krishnan, Jatin Chhugani...
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
15 years 7 months ago
A Watermarking Infrastructure for Enterprise Document Management
Digital watermarking is a promising technology to embed copyright information as unperceivable signals in digital contents. Although various watermarking techniques have been empl...
Shing-Chi Cheung, Dickson K. W. Chiu
HICSS
2003
IEEE
98views Biometrics» more  HICSS 2003»
15 years 7 months ago
Effectiveness and Applicability of Internet-Based Training in the Corporation - Case of Egypt
Learning is the most indispensable activity in the current knowledge-based economy where firms, in order to compete and survive, must be constantly alert, capable of adapting to f...
Mohamed Ibrahim
« Prev « First page 1589 / 1625 Last » Next »