Sciweavers

2571 search results - page 348 / 515
» Window-Based Method for Information Retrieval
Sort
View
CCS
2004
ACM
15 years 9 months ago
Attacking and repairing the winZip encryption scheme
WinZip is a popular compression utility for Microsoft Windows computers, the latest version of which is advertised as having “easy-to-use AES encryption to protect your sensitiv...
Tadayoshi Kohno
150
Voted
SERA
2010
Springer
15 years 2 months ago
Process Patterns for MDA-Based Software Development
—Information systems are expected to satisfy increasingly ambitious requirements, while reducing time–to–market has become a primary objective. This trend has necessitated th...
Mohsen Asadi, Naeem Esfahani, Raman Ramsin
CIVR
2007
Springer
273views Image Analysis» more  CIVR 2007»
15 years 10 months ago
Scalable near identical image and shot detection
This paper proposes and compares two novel schemes for near duplicate image and video-shot detection. The first approach is based on global hierarchical colour histograms, using ...
Ondrej Chum, James Philbin, Michael Isard, Andrew ...
FOCS
2007
IEEE
15 years 10 months ago
Intrusion-Resilient Secret Sharing
We introduce a new primitive called Intrusion-Resilient Secret Sharing (IRSS), whose security proof exploits the fact that there exist functions which can be efficiently computed ...
Stefan Dziembowski, Krzysztof Pietrzak
WWW
2006
ACM
16 years 4 months ago
Selective hypertext induced topic search
We address the problem of answering broad-topic queries on the World Wide Web. We present a link based analysis algorithm SelHITS, which is an improvement over Kleinberg's HI...
Amit C. Awekar, Pabitra Mitra, Jaewoo Kang