Sciweavers

511 search results - page 9 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
95
Voted
RECOSOC
2007
116views Hardware» more  RECOSOC 2007»
15 years 1 months ago
IBC-EI: An Instruction Based Compression method with Encryption and Integrity Checking
Code Compression has been shown to be efficient in minimizing the memory requirements for embedded systems as well as in power consumption reduction and performance improvement. I...
Eduardo Wanderley Netto, Reouven Elbaz, Lionel Tor...
CIKM
2010
Springer
14 years 10 months ago
Semantic tags generation and retrieval for online advertising
One of the main problems in online advertising is to display ads which are relevant and appropriate w.r.t. what the user is looking for. Often search engines fail to reach this go...
Roberto Mirizzi, Azzurra Ragone, Tommaso Di Noia, ...
81
Voted
VTS
2007
IEEE
105views Hardware» more  VTS 2007»
15 years 6 months ago
Effects of Embedded Decompression and Compaction Architectures on Side-Channel Attack Resistance
Attack resistance has been a critical concern for security-related applications. Various side-channel attacks can be launched to retrieve security information such as encryption k...
Chunsheng Liu, Yu Huang
ISMIR
2003
Springer
124views Music» more  ISMIR 2003»
15 years 4 months ago
Toward the scientific evaluation of music information retrieval systems
This paper outlines the findings-to-date of a project to assist in the efforts being made to establish a TREC-like evaluation paradigm within the Music Information Retrieval (MIR)...
J. Stephen Downie
CAISE
2004
Springer
15 years 5 months ago
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment
Abstract. Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ig...
Xiaocheng Ge, Fiona Polack, Régine Laleau