Sciweavers

1296 search results - page 99 / 260
» The Number Field Sieve
Sort
View
110
Voted
SIGMOD
2008
ACM
122views Database» more  SIGMOD 2008»
15 years 7 days ago
The conference reviewing crisis and a proposed solution
In Computer Science, we have developed a vibrant conference culture, which has served us well thus far. However, with the growth of our field, the number of submissions to many co...
H. V. Jagadish
ACSAC
2010
IEEE
14 years 10 months ago
Network intrusion detection: dead or alive?
Research on network intrusion detection has produced a number of interesting results. In this paper, I look back to the NetSTAT system, which was presented at ACSAC in 1998. In ad...
Giovanni Vigna
99
Voted
ICUMT
2009
14 years 10 months ago
DroidGlove: An android-based application for wrist rehabilitation
Serious games embody a class of applications able to produce real world benefits for individuals, or for the society, through the entertainment of players engaged in a game. The pe...
Dario Deponti, Dario Maggiorini, Claudio E. Palazz...
83
Voted
IJNSEC
2010
105views more  IJNSEC 2010»
14 years 7 months ago
A Note on the Constructions of Orthomorphic Permutations
Orthomorphic permutations have important applications in the design of block ciphers. A practical algorithm is derived to generate all orthomorphic permutations over Fm 2 , and it...
Jianqin Zhou
112
Voted
WWW
2009
ACM
16 years 1 months ago
A geographical analysis of knowledge production in computer science
We analyze knowledge production in Computer Science by means of coauthorship networks. For this, we consider 30 graduate programs of different regions of the world, being 8 progra...
Alberto H. F. Laender, Guilherme Vale Menezes, Niv...