Sciweavers

2784 search results - page 299 / 557
» Relation Extraction with Relation Topics
Sort
View
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
15 years 8 months ago
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
The security of hash functions has recently become one of the hottest topics in the design and analysis of cryptographic primitives. Since almost all the hash functions used today ...
Jonathan J. Hoch, Adi Shamir
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
15 years 8 months ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval
VLDB
2000
ACM
125views Database» more  VLDB 2000»
15 years 8 months ago
Focused Crawling Using Context Graphs
Maintaining currency of search engine indices by exhaustive crawling is rapidly becoming impossible due to the increasing size and dynamic content of the web. Focused crawlers aim...
Michelangelo Diligenti, Frans Coetzee, Steve Lawre...
HT
1991
ACM
15 years 8 months ago
Hyperspeech: Navigating in Speech-Only Hypermedia
Most hypermedia systems emphasize the integration of graphics, images, video, and audio into a traditional hypertext framework. The hyperspeech system described in this paper, a s...
Barry Arons
NSDI
2007
15 years 7 months ago
A Location-Based Management System for Enterprise Wireless LANs
: The physical locations of clients and access points in a wireless LAN may have a large impact on network performance. However, today’s WLAN management tools do not provide info...
Ranveer Chandra, Jitendra Padhye, Alec Wolman, Bri...