Sciweavers

3227 search results - page 318 / 646
» Designing with Distance Fields
Sort
View
NSPW
2004
ACM
15 years 10 months ago
The user non-acceptance paradigm: INFOSEC's dirty little secret
(by Victor Raskin) This panel will address users’ perceptions and misperceptions of the risk/benefit and benefit/nuisance ratios associated with information security products, an...
Steven J. Greenwald, Kenneth G. Olthoff, Victor Ra...
WIDM
2004
ACM
15 years 10 months ago
Probabilistic models for focused web crawling
A Focused crawler must use information gleaned from previously crawled page sequences to estimate the relevance of a newly seen URL. Therefore, good performance depends on powerfu...
Hongyu Liu, Evangelos E. Milios, Jeannette Janssen
115
Voted
CCS
1994
ACM
15 years 9 months ago
Protocol Failure in the Escrowed Encryption Standard
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, popularly known as "Clipper" chips, intended to protect unclassified g...
Matt Blaze
ECML
2006
Springer
15 years 8 months ago
Automatically Evolving Rule Induction Algorithms
Research in the rule induction algorithm field produced many algorithms in the last 30 years. However, these algorithms are usually obtained from a few basic rule induction algorit...
Gisele L. Pappa, Alex Alves Freitas
132
Voted
PKC
2000
Springer
118views Cryptology» more  PKC 2000»
15 years 8 months ago
An Identification Scheme Based on Sparse Polynomials
This paper gives a new example of exploiting the idea of using polynomials with restricted coefficients over finite fields and rings to construct reliable cryptosystems and identif...
William D. Banks, Daniel Lieman, Igor Shparlinski