Sciweavers

1898 search results - page 354 / 380
» Weak Keys for IDEA
Sort
View
130
Voted
BIOSIG
2008
170views Biometrics» more  BIOSIG 2008»
15 years 3 months ago
Frontex Perspectives on Biometrics for Border Checks
: The European Union is developing new concepts for border management. Biometrics is seen is a key technology to facilitate more secure and convenient border management. Biometric ...
Erik Berglund, Rasa Karbauskaite
103
Voted
ECIR
2008
Springer
15 years 3 months ago
A Comparison of Social Bookmarking with Traditional Search
Abstract. Social bookmarking systems allow users to store links to internet resources on a web page. As social bookmarking systems are growing in popularity, search algorithms have...
Beate Krause, Andreas Hotho, Gerd Stumme
183
Voted
MASCOTS
2010
15 years 3 months ago
PUD-LRU: An Erase-Efficient Write Buffer Management Algorithm for Flash Memory SSD
Flash memory SSDs pose a well-known challenge, that is, the erase-before-write problem. Researchers try to solve this inherent problem from two different angles by either designing...
Jian Hu, Hong Jiang, Lei Tian, Lei Xu
109
Voted
IJCAI
2007
15 years 3 months ago
Document Summarization Using Conditional Random Fields
Many methods, including supervised and unsupervised algorithms, have been developed for extractive document summarization. Most supervised methods consider the summarization task ...
Dou Shen, Jian-Tao Sun, Hua Li, Qiang Yang, Zheng ...
127
Voted
NETWORKING
2008
15 years 3 months ago
The CPBT: A Method for Searching the Prefixes Using Coded Prefixes in B-Tree
Due to the increasing size of IP routing table and the growing rate of their lookups, many algorithms are introduced to achieve the required speed in table search and update or opt...
Mohammad Behdadfar, Hossein Saidi