Abstract. Digital signatures are often proven to be secure in the random oracle model while hash functions deviate more and more from this idealization. Liskov proposed to model a ...
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
In this paper, we describe an interface for browsing and skipping digital video content in a consumer setting; that is, sitting and watching television from a couch using a standa...
Steven M. Drucker, Asta Glatzer, Steven De Mar, Cu...
Abstract. MiDiLiB is a six year research project on digital music libraries funded by the German Research Foundation (DFG) as a part of the Distributed Processing and Delivery of D...
This paper introduces the MREF framework for representing and correlating information at a higher semantic level than is possible with Web-based information systems today. The rol...