Sciweavers

1583 search results - page 226 / 317
» Standardization and Competitive Advantage
Sort
View
FSE
2006
Springer
132views Cryptology» more  FSE 2006»
15 years 1 months ago
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
In this paper, we define and analyze a new blockcipher mode of operation for encryption, CENC, which stands for Cipher-based ENCryption. CENC has the following advantages: (1) bey...
Tetsu Iwata
AAAI
2008
15 years 9 days ago
Semi-Supervised Ensemble Ranking
Ranking plays a central role in many Web search and information retrieval applications. Ensemble ranking, sometimes called meta-search, aims to improve the retrieval performance b...
Steven C. H. Hoi, Rong Jin
ADMA
2008
Springer
124views Data Mining» more  ADMA 2008»
14 years 12 months ago
Dimensionality Reduction for Classification
We investigate the effects of dimensionality reduction using different techniques and different dimensions on six two-class data sets with numerical attributes as pre-processing fo...
Frank Plastria, Steven De Bruyne, Emilio Carrizosa
CBSE
2008
Springer
14 years 12 months ago
Ada-CCM: Component-Based Technology for Distributed Real-Time Systems
: This paper proposes a technology for the development of distributed real-time component-based applications, which takes advantage of the features that Ada offers for the developm...
Patricia López Martínez, José...
CHES
2008
Springer
146views Cryptology» more  CHES 2008»
14 years 12 months ago
Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration
Dynamically reconfigurable systems are known to have many advantages such as area and power reduction. The drawbacks of these systems are the reconfiguration delay and the overhead...
Nele Mentens, Benedikt Gierlichs, Ingrid Verbauwhe...