Sciweavers

1466 search results - page 157 / 294
» Completeness of the Authentication Tests
Sort
View
EUROCRYPT
2001
Springer
15 years 8 months ago
Structural Cryptanalysis of SASAS
In this paper we consider the security of block ciphers which contain alternate layers of invertible S-boxes and affine mappings (there are many popular cryptosystems which use thi...
Alex Biryukov, Adi Shamir
ICOIN
2001
Springer
15 years 8 months ago
An Advanced Integrated Architecture for Wireless Voicemail Data Retrieval
This paper describes an alternative architecture for voicemail data retrieval on the move. It is comprised of three distinct components: a speech recognizer, a text summarizer and...
Konstantinos Koumpis, Charalampos Ladas, Steve Ren...
121
Voted
VLDB
2001
ACM
131views Database» more  VLDB 2001»
15 years 8 months ago
Change-Centric Management of Versions in an XML Warehouse
: We present a change-centric method to manage versions in a Web WareHouse of XML data. The starting points is a sequence of snapshots of XML documents we obtain from the web. By r...
Amélie Marian, Serge Abiteboul, Gregory Cob...
130
Voted
ICIP
2000
IEEE
15 years 8 months ago
Open-Ended Texture Classification for Terrain Mapping
This paper introduces a new classification scheme called “open-ended texture classification.” The standard approach for texture classification is to use a closed n-class cl...
Rupert Paget, I. Dennis Longstaff
ITICSE
2000
ACM
15 years 8 months ago
Making students read and review code
The Praktomat system allows students to read, review, and assess each other’s programs in order to improve quality and style. After a successful submission, the student can retr...
Andreas Zeller