Sciweavers

109 search results - page 12 / 22
» Data publication in the open access initiative
Sort
View
JODI
2010
115views more  JODI 2010»
14 years 4 months ago
ICE-Theorem - End to end semantically aware eResearch infrastructure for theses
: ICE-TheOREM was a project which made several important contributions to the repository domain, promoting deposit by integrating the repository with authoring workflows and enhanc...
Peter Sefton, Jim Downing
EUROCRYPT
2004
Springer
15 years 3 months ago
Positive Results and Techniques for Obfuscation
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program P into a new program O(P) with the same functionality as P, but such that O(P)...
Ben Lynn, Manoj Prabhakaran, Amit Sahai
CCS
2005
ACM
15 years 3 months ago
Improving Brumley and Boneh timing attack on unprotected SSL implementations
Since the remarkable work of Kocher [7], several papers considering different types of timing attacks have been published. In 2003, Brumley and Boneh presented a timing attack on...
Onur Aciiçmez, Werner Schindler, Çet...
HICSS
2008
IEEE
165views Biometrics» more  HICSS 2008»
15 years 4 months ago
CRM and Customer Portfolio Management for E-Tailers
“Don’t put all your eggs in one basket” is common wisdom with respect to financial portfolio theory. The configuration of customer portfolios with regard to appropriate risk...
Dennis Kundisch, Stefan Sackmann, Markus Ruch
76
Voted
SPAA
2004
ACM
15 years 3 months ago
Pagoda: a dynamic overlay network for routing, data management, and multicasting
The tremendous growth of public interest in peer-to-peer systems in recent years has initiated a lot of research work on how to design efficient and robust overlay networks for t...
Ankur Bhargava, Kishore Kothapalli, Chris Riley, C...