Sciweavers

3657 search results - page 76 / 732
» A Study of Practical Deduplication
Sort
View
IACR
2011
85views more  IACR 2011»
12 years 10 months ago
Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64
The hardware-attractive block cipher family KTANTAN was studied by Bogdanov and Rechberger who identified flaws in the key schedule and gave a meet-in-the-middle attack. We revis...
Martin Ågren
WWW
2009
ACM
14 years 11 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang
HICSS
2010
IEEE
225views Biometrics» more  HICSS 2010»
14 years 5 months ago
A Comparative Analysis of Professional Forums in the United States Army and Hybrid Communities of Practice in the Civilian Secto
Communities of practice (COPs) have been around since the founding of the first social networks many millennia ago. Organizations around the world over the last two decades have l...
Jon Brickey, Steven Walczak
SIGMOD
2008
ACM
143views Database» more  SIGMOD 2008»
14 years 10 months ago
Middleware-based database replication: the gaps between theory and practice
The need for high availability and performance in data management systems has been fueling a long running interest in database replication from both academia and industry. However...
Emmanuel Cecchet, George Candea, Anastasia Ailamak...
HICSS
2007
IEEE
156views Biometrics» more  HICSS 2007»
14 years 4 months ago
KnowFlow - A Hybrid Approach to Identifying and Visualizing Distributed Knowledge Work Practices
Understanding collaborative work practices represents a critical factor in and a necessary fundament for the development of effective Computer Supported Collaborative Work (CSCW) ...
Markus Strohmaier, Stefanie N. Lindstaedt