Sciweavers

4616 search results - page 591 / 924
» Extreme Components Analysis
Sort
View
ASIACRYPT
2010
Springer
15 years 3 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir
GLOBECOM
2010
IEEE
15 years 3 months ago
ViVUD: Virtual Server Cluster Based View-Upload Decoupling for Multi-Channel P2P Video Streaming Systems
Despite the success to deliver increasingly large number of channels to millions of users, the current multichannel P2P video streaming systems still suffer several fundamental per...
Chao Liang, Yong Liu
150
Voted
SEMWEB
2010
Springer
15 years 2 months ago
Supporting Natural Language Processing with Background Knowledge: Coreference Resolution Case
Systems based on statistical and machine learning methods have been shown to be extremely effective and scalable for the analysis of large amount of textual data. However, in the r...
Volha Bryl, Claudio Giuliano, Luciano Serafini, Ka...
USS
2010
15 years 2 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
BICOB
2009
Springer
15 years 2 months ago
A Biclustering Method to Discover Co-regulated Genes Using Diverse Gene Expression Datasets
We propose a two-step biclustering approach to mine co-regulation patterns of a given reference gene to discover other genes that function in a common biological process. Currently...
Doruk Bozdag, Jeffrey D. Parvin, Ümit V. &Cce...