Sciweavers

609 search results - page 94 / 122
» Computation of Homology Groups and Generators
Sort
View
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
14 years 10 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
ICDE
2008
IEEE
131views Database» more  ICDE 2008»
16 years 1 months ago
Parallel Evaluation of Composite Aggregate Queries
Aggregate measures summarizing subsets of data are valuable in exploratory analysis and decision support, especially when dependent aggregations can be easily specified and compute...
Lei Chen 0003, Christopher Olston, Raghu Ramakrish...
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
16 years 13 days ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
107
Voted
PERCOM
2008
ACM
15 years 11 months ago
Budget-Based Clustering with Context-awareness for Sensor Networks
As the scale of modern sensor networks continues to grow, energy consumption, scalability and routing efficiency are becoming key design challenges. Network management plays an im...
Jiaxi You, Dominik Lieckfeldt, Matthias Handy, Dir...
PERCOM
2007
ACM
15 years 11 months ago
Using Digital Cameras for Text Input on Mobile Devices
This paper presents novel text input methods for mobile devices. In particular, it shows how users can capture text from books, newspapers, and other objects by using the digital ...
Frank Siegemund, Muhammad Haroon