Sciweavers

519 search results - page 77 / 104
» How to make secure email easier to use
Sort
View
83
Voted
HT
2009
ACM
15 years 4 months ago
Designing hypertext tools to facilitate authoring multiple points-of-view stories
How can authoring tools help authors create complex, innovative hypertext narrative structures? Tools for creating hypertext fiction typically represent such narratives in the fo...
Alex Mitchell, Kevin McGee
52
Voted
ACNS
2006
Springer
79views Cryptology» more  ACNS 2006»
15 years 3 months ago
The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions
Abstract. In this paper, we present the rainbow attack on stream ciphers filtered by Maiorana-McFarland functions. This can be considered as a generalization of the time-memory-da...
Khoongming Khoo, Guang Gong, Hian-Kiat Lee
STOC
2010
ACM
295views Algorithms» more  STOC 2010»
15 years 2 months ago
Approximation Schemes for Steiner Forest on Planar Graphs and Graphs of Bounded Treewidth
We give the first polynomial-time approximation scheme (PTAS) for the Steiner forest problem on planar graphs and, more generally, on graphs of bounded genus. As a first step, w...
MohammadHossein Bateni, MohammadTaghi Hajiaghayi a...
AOSD
2007
ACM
15 years 1 months ago
Join point selectors
One of the main issues in modern aspect-oriented programming languages and frameworks is the expressiveness of the pointcut language or mechanism. The expressiveness of pointcut l...
Cristiano Breuel, Francisco Reverbel
AEI
2004
132views more  AEI 2004»
14 years 9 months ago
An adaptive website system to improve efficiency with web mining techniques
The paper proposes an adaptive web system--that is, a website that is capable of changing its original design to fit user requirements. For the purpose of improving shortcomings o...
Ji-Hyun Lee, Wei-Kun Shiu