Sciweavers

4327 search results - page 708 / 866
» Web presentation system using RST events
Sort
View
LATINCRYPT
2010
15 years 3 months ago
Cryptanalysis of the Hidden Matrix Cryptosystem
Abstract. In this paper, we present an efficient cryptanalysis of the socalled HM cryptosystem which was published at Asiacrypt’1999, and one perturbed version of HM. Until now, ...
Jean-Charles Faugère, Antoine Joux, Ludovic...
RE
2005
Springer
15 years 11 months ago
Contextual Risk Analysis for Interview Design
Interviews with stakeholders can be a useful method for identifying user needs and establishing requirements. However, interviews are also problematic. They are time consuming and...
Tira Cohene, Steve M. Easterbrook
IC
2003
15 years 6 months ago
Concept Based Query Enhancement in the ARCH Search Agent
The quality of the search experience has been an enduring problem for the World Wide Web. One of the well-known difficulties is the tendency of users to use short, under-specified...
Ahu Sieg, Bamshad Mobasher, Steven L. Lytinen, Rob...
ECMDAFA
2010
Springer
132views Hardware» more  ECMDAFA 2010»
15 years 5 months ago
An Integrated Facet-Based Library for Arbitrary Software Components
Reuse is an important means of reducing costs and effort during the development of complex software systems. A major challenge is to find suitable components in a large library wit...
Matthias Schmidt, Jan Polowinski, Jendrik Johannes...
ECRTS
2002
IEEE
15 years 10 months ago
A QoS-Sensitive Approach for Timeliness and Freshness Guarantees in Real-Time Databases
The demand for real-time database services has been increasing recently. Examples include sensor data fusion, decision support, web information services, and online trading. In th...
Kyoung-Don Kang, Sang Hyuk Son, John A. Stankovic,...