Sciweavers

3155 search results - page 526 / 631
» Maintenance: Less Is Not More
Sort
View
CHI
2009
ACM
16 years 5 months ago
StoryTags: once upon a time, there was a photo
Nuno Tom?s Daniel Gon?alves With the growing volume of digital information users must deal with, management and retrieval tasks have become increasingly problematic. A popular way ...
Nuno Tomás, Tiago João Vieira Guerre...
SAS
2009
Springer
214views Formal Methods» more  SAS 2009»
16 years 5 months ago
Abstract Interpretation of FIFO Replacement
Interpretation of FIFO Replacement Daniel Grund and Jan Reineke Saarland University, Saarbr?ucken, Germany In hard real-time systems, the execution time of programs must be bounded...
Daniel Grund, Jan Reineke
PKC
2009
Springer
126views Cryptology» more  PKC 2009»
16 years 5 months ago
Verifiable Rotation of Homomorphic Encryptions
Similar to verifiable shuffling (or, mixing), we consider the problem of verifiable rotating (and random re-encrypting) a given list of homomorphic encryptions. The offset by which...
Sebastiaan de Hoogh, Berry Schoenmakers, Boris Sko...
KDD
2007
ACM
152views Data Mining» more  KDD 2007»
16 years 4 months ago
A framework for classification and segmentation of massive audio data streams
In recent years, the proliferation of VOIP data has created a number of applications in which it is desirable to perform quick online classification and recognition of massive voi...
Charu C. Aggarwal
176
Voted
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
16 years 4 months ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu