Sciweavers

1040 search results - page 175 / 208
» A New Periodicity Lemma
Sort
View
SCN
2010
Springer
144views Communications» more  SCN 2010»
13 years 8 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng
SOCO
2010
Springer
13 years 8 months ago
Automatic detection of trends in time-stamped sequences: an evolutionary approach
This paper presents an evolutionary algorithm for modeling the arrival dates in time-stamped data sequences such as newscasts, e-mails, IRC conversations, scientific journal artic...
Lourdes Araujo, Juan Julián Merelo Guerv&oa...
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 7 months ago
An In-depth Analysis of Spam and Spammers
Electronic mail services have become an important source of communication for millions of people all over the world. Due to this tremendous growth, there has been a significant in...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...
ICONFERENCE
2011
13 years 4 months ago
Blogs: spinning a web of virality
The aim of this study is to understand the role of bloggers in driving viral information. More specifically, we develop a new methodology that creates a map of the „life cycle...
Karine Nahon, Jeff Hemsley, Shawn Walker, Muzammil...
TIP
2010
277views more  TIP 2010»
13 years 4 months ago
Distance Regularized Level Set Evolution and Its Application to Image Segmentation
Level set methods have been widely used in image processing and computer vision. In conventional level set formulations, the level set function typically develops irregularities du...
Chunming Li, Chenyang Xu, Changfeng Gui, Martin D....