Sciweavers

1248 search results - page 244 / 250
» Comparable Entity Mining from Comparative Questions
Sort
View
122
Voted
IJNSEC
2008
98views more  IJNSEC 2008»
15 years 3 months ago
An Update on the Analysis and Design of NMAC and HMAC Functions
In this paper, we investigate the issues in the analysis and design of provably secure message authentication codes (MACs) Nested MAC (NMAC) and Hash based MAC (HMAC) proposed by ...
Praveen Gauravaram, Shoichi Hirose, Suganya Annadu...
134
Voted
JGS
2006
113views more  JGS 2006»
15 years 3 months ago
Pattern based map comparisons
Map comparison techniques based on a pixel-by-pixel comparison are useful for many purposes, but fail to reveal important aspects of map similarities and differences. In contrast, ...
Roger White
110
Voted
BMCBI
2005
107views more  BMCBI 2005»
15 years 3 months ago
Identifying differential expression in multiple SAGE libraries: an overdispersed log-linear model approach
Background: In testing for differential gene expression involving multiple serial analysis of gene expression (SAGE) libraries, it is critical to account for both between and with...
Jun Lu, John K. Tomfohr, Thomas B. Kepler
TPDS
2008
175views more  TPDS 2008»
15 years 3 months ago
Centralized versus Distributed Schedulers for Bag-of-Tasks Applications
Multiple applications that execute concurrently on heterogeneous platforms compete for CPU and network resources. In this paper, we consider the problem of scheduling applications ...
Olivier Beaumont, Larry Carter, Jeanne Ferrante, A...
145
Voted
ACSAC
2010
IEEE
15 years 1 months ago
Conficker and beyond: a large-scale empirical study
Conficker [26] is the most recent widespread, well-known worm/bot. According to several reports [16, 28], it has infected about 7 million to 15 million hosts and the victims are s...
Seungwon Shin, Guofei Gu