Sciweavers

3333 search results - page 630 / 667
» Abstract Proof Search
Sort
View
SIGIR
2008
ACM
15 years 2 months ago
On profiling blogs with representative entries
With an explosive growth of blogs, information seeking in blogosphere becomes more and more challenging. One example task is to find the most relevant topical blogs against a give...
Jinfeng Zhuang, Steven C. H. Hoi, Aixin Sun
INFORMATICALT
2007
152views more  INFORMATICALT 2007»
15 years 2 months ago
On the Application of Invariant Image Parameters to Fractal Encoding of Bi-Level Images
Abstract. Fractal image compression is an engaging and worthwhile technology that may be successfully applied to still image coding, especially at high compression ratios. Unfortun...
Jonas Valantinas, Tomas Zumbakis
105
Voted
JSAC
2007
59views more  JSAC 2007»
15 years 2 months ago
On scheduling of peer-to-peer video services
Abstract— Peer-to-peer (P2P) video systems provide a costeffective way for a large number of hosts to colloaborate for video sharing. Two features characterize such a system: 1) ...
Ying Cai, Ashwin Natarajan, Johnny Wong
115
Voted
PVLDB
2008
81views more  PVLDB 2008»
15 years 2 months ago
Optimization of multi-domain queries on the web
Where can I attend an interesting database workshop close to a sunny beach? Who are the strongest experts on service computing based upon their recent publication record and accep...
Daniele Braga, Stefano Ceri, Florian Daniel, David...
110
Voted
ASIACRYPT
2010
Springer
15 years 20 days ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir