Sciweavers

651 search results - page 108 / 131
» Adding Search to Zinc
Sort
View
128
Voted
IEEECIT
2010
IEEE
15 years 1 months ago
On Small Subgroup Non-confinement Attack
The small subgroup confinement attack works by confining cryptographic operations within a small subgroup, in which exhaustive search is feasible. This attack is overt and hence ca...
Feng Hao
132
Voted
FAST
2009
15 years 1 months ago
Generating Realistic Impressions for File-System Benchmarking
The performance of file systems and related software depends on characteristics of the underlying file-system image (i.e., file-system metadata and file contents). Unfortunately, ...
Nitin Agrawal, Andrea C. Arpaci-Dusseau, Remzi H. ...
152
Voted
TSMC
2010
14 years 10 months ago
Bio-inspired Algorithms for Autonomous Deployment and Localization of Sensor Nodes
Abstract--Optimal deployment and accurate localization of sensor nodes have a strong influence on the performance of a wireless sensor network (WSN). This paper considers real-time...
Raghavendra V. Kulkarni, Ganesh K. Venayagamoorthy
134
Voted
CHB
2011
93views more  CHB 2011»
14 years 7 months ago
Web Wisdom: An essay on how Web 2.0 and Semantic Web can foster a global knowledge society
Admittedly this is a presumptuous title that should never be used when reporting on individual research advances. Wisdom is just not a scientific concept. In this case, though, w...
Christopher Thomas, Amit P. Sheth
192
Voted
EUROCON
2011
281views Hardware» more  EUROCON 2011»
14 years 7 months ago
Browsing videos by automatically detected audio events
—This paper focuses on Audio Event Detection (AED), a research area which aims to substantially enhance the access to audio in multimedia content. With the ever-growing quantity ...
Virginia Barbosa, Thomas Pellegrini, Miguel Bugalh...