Sciweavers

10459 search results - page 1970 / 2092
» Multimedia Information Retrieval
Sort
View
ICNP
2007
IEEE
15 years 11 months ago
HEXA: Compact Data Structures for Faster Packet Processing
—Data structures representing directed graphs with edges labeled by symbols from a finite alphabet are used to implement packet processing algorithms used in a variety of network...
Sailesh Kumar, Jonathan S. Turner, Patrick Crowley...
161
Voted
DRM
2007
Springer
15 years 11 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
148
Voted
GCB
2007
Springer
134views Biometrics» more  GCB 2007»
15 years 11 months ago
An Application of Latent Topic Document Analysis to Large-Scale Proteomics Databases
Since the advent of public data repositories for proteomics data, readily accessible results from high-throughput experiments have been accumulating steadily. Several large-scale p...
Sebastian Klie, Lennart Martens, Juan Antonio Vizc...
JCDL
2006
ACM
147views Education» more  JCDL 2006»
15 years 11 months ago
The social life of books in the humane library
The development of public libraries may have inadvertently brought the age of marginalia to a close but the advent of digital libraries could revive the practice of marginal annot...
Yoram Chisik, Nancy Kaplan
SASN
2006
ACM
15 years 11 months ago
Diversify sensor nodes to improve resilience against node compromise
A great challenge in securing sensor networks is that sensor nodes can be physically compromised. Once a node is compromised, attackers can retrieve secret information (e.g. keys)...
Abdulrahman Alarifi, Wenliang Du
« Prev « First page 1970 / 2092 Last » Next »