Sciweavers

20175 search results - page 147 / 4035
» Is abstraction the key to computing
Sort
View
80
Voted
CHI
1994
ACM
15 years 5 months ago
Repeat and predict: two keys to efficient text editing
We propose a simple and powerful predictive interface technique for text editing tasks. With our technique called the dynamic macro creation, when a user types a special "rep...
Toshiyuki Masui, Ken Nakayama
102
Voted
DIMVA
2010
14 years 10 months ago
KIDS - Keyed Intrusion Detection System
Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection. Unfortunately malicious packets may be crafted to m...
Sasa Mrdovic, Branislava Drazenovic
IACR
2011
116views more  IACR 2011»
14 years 14 days ago
Some Words About Cryptographic Key Recognition In Data Streams
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at...
Alexey Chilikov, Evgeny Alekseev
111
Voted
ACSC
2009
IEEE
15 years 7 months ago
Fast and Compact Hash Tables for Integer Keys
A hash table is a fundamental data structure in computer science that can offer rapid storage and retrieval of data. A leading implementation for string keys is the cacheconscious...
Nikolas Askitis