Sciweavers

651 search results - page 108 / 131
» Adding Search to Zinc
Sort
View
117
Voted
IEEECIT
2010
IEEE
14 years 11 months ago
On Small Subgroup Non-confinement Attack
The small subgroup confinement attack works by confining cryptographic operations within a small subgroup, in which exhaustive search is feasible. This attack is overt and hence ca...
Feng Hao
114
Voted
FAST
2009
14 years 11 months ago
Generating Realistic Impressions for File-System Benchmarking
The performance of file systems and related software depends on characteristics of the underlying file-system image (i.e., file-system metadata and file contents). Unfortunately, ...
Nitin Agrawal, Andrea C. Arpaci-Dusseau, Remzi H. ...
140
Voted
TSMC
2010
14 years 8 months ago
Bio-inspired Algorithms for Autonomous Deployment and Localization of Sensor Nodes
Abstract--Optimal deployment and accurate localization of sensor nodes have a strong influence on the performance of a wireless sensor network (WSN). This paper considers real-time...
Raghavendra V. Kulkarni, Ganesh K. Venayagamoorthy
CHB
2011
93views more  CHB 2011»
14 years 5 months ago
Web Wisdom: An essay on how Web 2.0 and Semantic Web can foster a global knowledge society
Admittedly this is a presumptuous title that should never be used when reporting on individual research advances. Wisdom is just not a scientific concept. In this case, though, w...
Christopher Thomas, Amit P. Sheth
176
Voted
EUROCON
2011
281views Hardware» more  EUROCON 2011»
14 years 5 months ago
Browsing videos by automatically detected audio events
—This paper focuses on Audio Event Detection (AED), a research area which aims to substantially enhance the access to audio in multimedia content. With the ever-growing quantity ...
Virginia Barbosa, Thomas Pellegrini, Miguel Bugalh...