Sciweavers

1437 search results - page 141 / 288
» Content Extraction Signatures
Sort
View
FCCM
2004
IEEE
163views VLSI» more  FCCM 2004»
15 years 6 months ago
Implementation Results of Bloom Filters for String Matching
Network Intrusion Detection and Prevention Systems (IDPS) use string matching to scan Internet packets for malicious content. Bloom filters offer a mechanism to search for a large...
Michael Attig, Sarang Dharmapurikar, John W. Lockw...
131
Voted
FC
2000
Springer
150views Cryptology» more  FC 2000»
15 years 6 months ago
Self-Scrambling Anonymizers
For the two last decades, people have tried to provide practical electronic cash schemes, with more or less success. Indeed, the most secure ones generally suffer from inefficiency...
David Pointcheval
BMVC
1998
15 years 3 months ago
Writer Identification from Non-uniformly Skewed Handwriting Images
Many techniques have been reported for handwriting-based writer identification. Most such techniques assume that the written text is fixed (e.g., in signature verification). In th...
H. E. S. Said, G. S. Peake, T. N. Tan, Keith D. Ba...
CONCUR
2010
Springer
15 years 3 months ago
A Theory of Design-by-Contract for Distributed Multiparty Interactions
Reliability is a critical issue in many multi-organizational distributed applications, be they web services, financial protocols, scientific computing infrastructure, and software ...
Laura Bocchi, Kohei Honda, Emilio Tuosto, Nobuko Y...
APAL
2008
93views more  APAL 2008»
15 years 2 months ago
Arithmetic of Dedekind cuts of ordered Abelian groups
We study Dedekind cuts on ordered Abelian groups. We introduce a monoid structure on them, and we characterise, via a suitable representation theorem, the universal part of the th...
Antongiulio Fornasiero, Marcello Mamino