Sciweavers

296 search results - page 32 / 60
» Restoring the popularity of computer science
Sort
View
TCS
2010
14 years 9 months ago
Error-repair parsing schemata
Robustness, the ability to analyze any input regardless of its grammaticality, is a desirable property for any system dealing with unrestricted natural language text. Error-repair...
Carlos Gómez-Rodríguez, Miguel A. Al...
TDSC
2011
14 years 6 months ago
Nymble: Blocking Misbehaving Users in Anonymizing Networks
—Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of...
Patrick P. Tsang, Apu Kapadia, Cory Cornelius, Sea...
CSE
2011
IEEE
13 years 11 months ago
Parallel Execution of AES-CTR Algorithm Using Extended Block Size
—Data encryption and decryption are common operations in a network based application programs with security. In order to keep pace with the input data rate in such applications, ...
Nhat-Phuong Tran, Myungho Lee, Sugwon Hong, Seung-...
ACSC
2009
IEEE
15 years 6 months ago
Microdata Protection Through Approximate Microaggregation
Microdata protection is a hot topic in the field of Statistical Disclosure Control, which has gained special interest after the disclosure of 658000 queries by the America Online...
Xiaoxun Sun, Hua Wang, Jiuyong Li
CSE
2009
IEEE
15 years 6 months ago
FaceCloak: An Architecture for User Privacy on Social Networking Sites
—Social networking sites, such as MySpace, Facebook and Flickr, are gaining more and more popularity among Internet users. As users are enjoying this new style of networking, pri...
Wanying Luo, Qi Xie, Urs Hengartner