Sciweavers

4201 search results - page 706 / 841
» Interaction graphs: Additives
Sort
View
ICC
2009
IEEE
155views Communications» more  ICC 2009»
15 years 2 months ago
On Hashing with Tweakable Ciphers
Cryptographic hash functions are often built on block ciphers in order to reduce the security of the hash to that of the cipher, and to minimize the hardware size. Proven secure co...
Raphael Chung-Wei Phan, Jean-Philippe Aumasson
ICMCS
2009
IEEE
151views Multimedia» more  ICMCS 2009»
15 years 2 months ago
High accuracy and language independent document retrieval with a Fast Invariant Transform
This paper presents a tool and a novel Fast Invariant Transform (FIT) algorithm for language independent e-documents access. The tool enables a person to access an e-document thro...
Qiong Liu, Hironori Yano, Don Kimber, Chunyuan Lia...
ICWS
2009
IEEE
15 years 2 months ago
Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes
The WS-BPEL specification focuses on business processes the activities of which are assumed to be interactions with Web services. However, WS-BPEL processes go beyond the orchestr...
Federica Paci, Rodolfo Ferrini, Elisa Bertino
ICWSM
2009
15 years 2 months ago
Emotionality in Text as Predictor of Behavior
The present study demonstrates how the emotional content of search terms and their eventual results affects the breadth of a users' search for information. We observed the qu...
Elliot Onn, Carey K. Morewedge
GPB
2010
231views Solid Modeling» more  GPB 2010»
15 years 2 months ago
Mining Gene Expression Profiles: An Integrated Implementation of Kernel Principal Component Analysis and Singular Value Decompos
The detection of genes that show similar profiles under different experimental conditions is often an initial step in inferring the biological significance of such genes. Visualiz...
Ferran Reverter, Esteban Vegas, Pedro Sánch...