Sciweavers

3602 search results - page 227 / 721
» Isn't It About Time
Sort
View
93
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir
118
Voted
ASUNAM
2011
IEEE
14 years 21 days ago
Evolutionary Clustering and Analysis of Bibliographic Networks
—In this paper, we study the problem of evolutionary clustering of multi-typed objects in a heterogeneous bibliographic network. The traditional methods of homogeneous clustering...
Manish Gupta, Charu C. Aggarwal, Jiawei Han, Yizho...
ICIP
2005
IEEE
16 years 2 months ago
The virtue of patience when scheduling media in presence of feedback
We consider streaming of pre-encoded and packetized media over best-effort networks in presence of acknowledgment feedback. Given an estimation of future transmission resources an...
Christophe De Vleeschouwer, Pascal Frossard
194
Voted
ICDE
2008
IEEE
131views Database» more  ICDE 2008»
16 years 2 months ago
MED: A Multimedia Event Database for 3D Crime Scene Representation and Analysis
The development of sensors capable of obtaining 3D scans of crime scenes is revolutionizing the ways in which crime scenes can be analyzed and at the same time is driving the need ...
Marcin Kwietniewski, Stephanie Wilson, Anna Topol,...
214
Voted
ICDE
2005
IEEE
160views Database» more  ICDE 2005»
16 years 2 months ago
Evaluation of Spatio-Temporal Predicates on Moving Objects
Moving objects databases managing spatial objects with continuously changing position and extent over time have recently found large interest in the database community. Queries ab...
Markus Schneider