Sciweavers

2263 search results - page 369 / 453
» Principles of Template Design
Sort
View
135
Voted
SIGIR
2004
ACM
15 years 9 months ago
Constructing a text corpus for inexact duplicate detection
As online document collections continue to expand, both on the Web and in proprietary environments, the need for duplicate detection becomes more critical. The goal of this work i...
Jack G. Conrad, Cindy P. Schriber
129
Voted
WPES
2004
ACM
15 years 9 months ago
Privacy management for portable recording devices
The growing popularity of inexpensive, portable recording devices, such as cellular phone cameras and compact digital audio recorders, presents a significant new threat to privac...
J. Alex Halderman, Brent R. Waters, Edward W. Felt...
107
Voted
EUROCRYPT
2004
Springer
15 years 9 months ago
Hash Function Balance and Its Impact on Birthday Attacks
Textbooks tell us that a birthday attack on a hash function h with range size r requires r1/2 trials (hash computations) to find a collision. But this is quite misleading, being t...
Mihir Bellare, Tadayoshi Kohno
129
Voted
GISCIENCE
2004
Springer
121views GIS» more  GISCIENCE 2004»
15 years 9 months ago
Semi-automatic Ontology Alignment for Geospatial Data Integration
In geospatial applications with heterogeneous databases, an ontology-driven approach to data integration relies on the alignment of the concepts of a global ontology that describe ...
Isabel F. Cruz, William Sunna, Anjli Chaudhry
112
Voted
IWDC
2004
Springer
156views Communications» more  IWDC 2004»
15 years 9 months ago
Agent-Based Distributed Intrusion Alert System
Intrusion detection for computer systems is a key problem in today’s networked society. Current distributed intrusion detection systems (IDSs) are not fully distributed as most o...
Arjita Ghosh, Sandip Sen