Sciweavers

2079 search results - page 365 / 416
» Research Problems in Data Warehousing
Sort
View
ASIAMS
2008
IEEE
15 years 4 months ago
A Blended Text Mining Method for Authorship Authentication Analysis
The paper elaborates upon the interim results achieved in resolving a few newly discovered 16th century letters now alleged to be written by Queen Mary of Scots (QMS). Despite the...
Philip Sallis, Subana Shanmuganathan
DAGSTUHL
2007
15 years 3 months ago
How Fast can be Algebraic Attacks on Block Ciphers?
In this paper we give a specification of a new block cipher that can be called the Courtois Toy Cipher (CTC). It is quite simple, and yet very much like any other known block ciph...
Nicolas Courtois
GISCIENCE
2010
Springer
192views GIS» more  GISCIENCE 2010»
15 years 3 months ago
Automatic Extraction of Destinations, Origins and Route Parts from Human Generated Route Directions
Researchers from the cognitive and spatial sciences are studying text descriptions of movement patterns in order to examine how humans communicate and understand spatial informatio...
Xiao Zhang, Prasenjit Mitra, Alexander Klippel, Al...
WISEC
2010
ACM
15 years 2 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
CORR
2010
Springer
169views Education» more  CORR 2010»
15 years 2 months ago
Spiking Neurons with ASNN Based-Methods for the Neural Block Cipher
Problem statement: This paper examines Artificial Spiking Neural Network (ASNN) which inter-connects group of artificial neurons that uses a mathematical model with the aid of blo...
Saleh Ali K. Al-Omari, Putra Sumari