Sciweavers

22128 search results - page 4270 / 4426
» Research in Structural Computing
Sort
View
173
Voted
CCS
2008
ACM
15 years 6 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
CHES
2008
Springer
134views Cryptology» more  CHES 2008»
15 years 6 months ago
Ultra High Performance ECC over NIST Primes on Commercial FPGAs
Elliptic Curve Cryptosystems (ECC) have gained increasing acceptance in practice due to their significantly smaller bit size of the operands compared to other public-key cryptosyst...
Tim Güneysu, Christof Paar
CIKM
2008
Springer
15 years 6 months ago
Probabilistic polyadic factorization and its application to personalized recommendation
Multiple-dimensional, i.e., polyadic, data exist in many applications, such as personalized recommendation and multipledimensional data summarization. Analyzing all the dimensions...
Yun Chi, Shenghuo Zhu, Yihong Gong, Yi Zhang
CIKM
2008
Springer
15 years 6 months ago
SQL extension for exploring multiple tables
The standard SQL assumes that the users are aware of all tables and their schemas to write queries. This assumption may be valid when the users deal with a relatively small number...
Sung Jin Kim, Junghoo John Cho
CIKM
2008
Springer
15 years 6 months ago
Similarity cross-analysis of tag / co-tag spaces in social classification systems
Recent growth of social classification systems due to steadily increasing popularity has established a multitude of heterogeneous isolated, non-integrated, and non-interoperable t...
Steffen Oldenburg, Martin Garbe, Clemens H. Cap
« Prev « First page 4270 / 4426 Last » Next »