Sciweavers

1466 search results - page 157 / 294
» Completeness of the Authentication Tests
Sort
View
EUROCRYPT
2001
Springer
14 years 15 days ago
Structural Cryptanalysis of SASAS
In this paper we consider the security of block ciphers which contain alternate layers of invertible S-boxes and affine mappings (there are many popular cryptosystems which use thi...
Alex Biryukov, Adi Shamir
ICOIN
2001
Springer
14 years 14 days ago
An Advanced Integrated Architecture for Wireless Voicemail Data Retrieval
This paper describes an alternative architecture for voicemail data retrieval on the move. It is comprised of three distinct components: a speech recognizer, a text summarizer and...
Konstantinos Koumpis, Charalampos Ladas, Steve Ren...
VLDB
2001
ACM
131views Database» more  VLDB 2001»
14 years 13 days ago
Change-Centric Management of Versions in an XML Warehouse
: We present a change-centric method to manage versions in a Web WareHouse of XML data. The starting points is a sequence of snapshots of XML documents we obtain from the web. By r...
Amélie Marian, Serge Abiteboul, Gregory Cob...
ICIP
2000
IEEE
14 years 12 days ago
Open-Ended Texture Classification for Terrain Mapping
This paper introduces a new classification scheme called “open-ended texture classification.” The standard approach for texture classification is to use a closed n-class cl...
Rupert Paget, I. Dennis Longstaff
ITICSE
2000
ACM
14 years 11 days ago
Making students read and review code
The Praktomat system allows students to read, review, and assess each other’s programs in order to improve quality and style. After a successful submission, the student can retr...
Andreas Zeller