Sciweavers

16626 search results - page 3244 / 3326
» Computing is a natural science
Sort
View
TCC
2010
Springer
324views Cryptology» more  TCC 2010»
15 years 10 months ago
Leakage-Resilient Signatures
The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insufficient due to â€...
Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, G...
WWW
2010
ACM
15 years 8 months ago
Atomate it! end-user context-sensitive automation using heterogeneous information sources on the web
The transition of personal information management (PIM) tools off the desktop to the Web presents an opportunity to augment these tools with capabilities provided by the wealth o...
Max Van Kleek, Brennan Moore, David R. Karger, Pau...
WWW
2010
ACM
15 years 8 months ago
Earthquake shakes Twitter users: real-time event detection by social sensors
Twitter, a popular microblogging service, has received much attention recently. An important characteristic of Twitter is its real-time nature. For example, when an earthquake occ...
Takeshi Sakaki, Makoto Okazaki, Yutaka Matsuo
119
Voted
WWW
2010
ACM
15 years 8 months ago
Measurement and analysis of an online content voting network: a case study of Digg
In online content voting networks, aggregate user activities (e.g., submitting and rating content) make high-quality content thrive through the unprecedented scale, high dynamics ...
Yingwu Zhu
117
Voted
ISPASS
2010
IEEE
15 years 8 months ago
Synthesizing memory-level parallelism aware miniature clones for SPEC CPU2006 and ImplantBench workloads
Abstract—We generate and provide miniature synthetic benchmark clones for modern workloads to solve two pre-silicon design challenges, namely: 1) huge simulation time (weeks to m...
Karthik Ganesan, Jungho Jo, Lizy K. John
« Prev « First page 3244 / 3326 Last » Next »