Sciweavers

1282 search results - page 203 / 257
» Sharing knowledge
Sort
View
SIGCOMM
2003
ACM
15 years 5 months ago
A high-level programming environment for packet trace anonymization and transformation
Packet traces of operational Internet traffic are invaluable to network research, but public sharing of such traces is severely limited by the need to first remove all sensitive...
Ruoming Pang, Vern Paxson
SIGIR
2003
ACM
15 years 5 months ago
The Personalized, Collaborative Digital Library Environment CYCLADES and Its Collections Management
Usually, a Digital Library (DL) is an information resource where users may submit queries to satisfy their daily information need. The CYCLADES system envisages a DL additionally a...
Leonardo Candela, Umberto Straccia
EUROCRYPT
2003
Springer
15 years 5 months ago
New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction
Perfectly secret message transmission can be realized with only partially secret and weakly correlated information shared by the parties as soon as this information allows for the ...
Renato Renner, Stefan Wolf
DATE
2002
IEEE
117views Hardware» more  DATE 2002»
15 years 4 months ago
Effective Software Self-Test Methodology for Processor Cores
Software self-testing for embedded processor cores based on their instruction set, is a topic of increasing interest since it provides an excellent test resource partitioning tech...
Nektarios Kranitis, Antonis M. Paschalis, Dimitris...
ICEIS
2002
IEEE
15 years 4 months ago
The AEX Method and Its Instrumentation
: We aim at elaborating a decision support system to manage concrete experience, using Artificial Intelligence methods, such as Case-Based Reasoning. We target any organization tha...
Sabine Delaître, Alain Giboin, Sabine Moisan