Sciweavers

7422 search results - page 1320 / 1485
» Ethnomethodologically informed ethnography and information s...
Sort
View
105
Voted
CCS
2004
ACM
15 years 7 months ago
Attacking and repairing the winZip encryption scheme
WinZip is a popular compression utility for Microsoft Windows computers, the latest version of which is advertised as having “easy-to-use AES encryption to protect your sensitiv...
Tadayoshi Kohno
CIKM
2004
Springer
15 years 7 months ago
Evaluating window joins over punctuated streams
We explore join optimizations in the presence of both timebased constraints (sliding windows) and value-based constraints (punctuations). We present the first join solution named...
Luping Ding, Elke A. Rundensteiner
104
Voted
CIKM
2004
Springer
15 years 7 months ago
Indexing text data under space constraints
An important class of queries is the LIKE predicate in SQL. In the absence of an index, LIKE queries are subject to performance degradation. The notion of indexing on substrings (...
Bijit Hore, Hakan Hacigümüs, Balakrishna...
147
Voted
CIT
2004
Springer
15 years 7 months ago
FPGA Based Implementation of an Invisible-Robust Image Watermarking Encoder
Abstract. Both encryption and digital watermarking techniques need to be incorporated in a digital rights management framework to address different aspects of content management. W...
Saraju P. Mohanty, Renuka Kumara C., Sridhara Naya...
GECCO
2004
Springer
15 years 7 months ago
A Systematic Study of Genetic Algorithms with Genotype Editing
Abstract. This paper continues our systematic study of an RNAediting computational model of Genetic Algorithms (GA). This model is constructed based on several genetic editing char...
Chien-Feng Huang, Luis Mateus Rocha
« Prev « First page 1320 / 1485 Last » Next »