Sciweavers

13383 search results - page 2384 / 2677
» Abstractions from proofs
Sort
View
FSE
2007
Springer
115views Cryptology» more  FSE 2007»
15 years 10 months ago
Improving the Security of MACs Via Randomized Message Preprocessing
Abstract. “Hash then encrypt” is an approach to message authentication, where first the message is hashed down using an ε-universal hash function, and then the resulting k-bi...
Yevgeniy Dodis, Krzysztof Pietrzak
GFKL
2007
Springer
152views Data Mining» more  GFKL 2007»
15 years 10 months ago
Supporting Web-based Address Extraction with Unsupervised Tagging
Abstract. The manual acquisition and modeling of tourist information as e.g. addresses of points of interest is time and, therefore, cost intensive. Furthermore, the encoded inform...
Berenike Loos, Chris Biemann
HIPEAC
2007
Springer
15 years 10 months ago
A Throughput-Driven Task Creation and Mapping for Network Processors
Abstract. Network processors are programmable devices that can process packets at a high speed. A network processor is typified by multithreading and heterogeneous multiprocessing...
Lixia Liu, Xiao-Feng Li, Michael K. Chen, Roy Dz-C...
HPCC
2007
Springer
15 years 10 months ago
Hybrid Line Search for Multiobjective Optimization
Abstract. The aggregation of objectives in multiple criteria programming is one of the simplest and widely used approach. But it is well known that these techniques sometimes fail ...
Crina Grosan, Ajith Abraham
ICB
2007
Springer
208views Biometrics» more  ICB 2007»
15 years 10 months ago
Face Matching Between Near Infrared and Visible Light Images
Abstract. In many applications, such as E-Passport and driver’s license, the enrollment of face templates is done using visible light (VIS) face images. Such images are normally ...
Dong Yi, Rong Liu, Rufeng Chu, Zhen Lei, Stan Z. L...
« Prev « First page 2384 / 2677 Last » Next »