Sciweavers

698 search results - page 85 / 140
» Evaluating Key Statements Analysis
Sort
View
ICDE
1993
IEEE
120views Database» more  ICDE 1993»
14 years 2 months ago
Adaptable Pointer Swizzling Strategies in Object Bases
In this article, different techniques for 'pointer swizzling" are classified and evaluated for optimizing the access to main-memory resident persistent objects. To speed ...
Alfons Kemper, Donald Kossmann
BTW
2007
Springer
153views Database» more  BTW 2007»
14 years 1 months ago
Efficient Time-Travel on Versioned Text Collections
: The availability of versioned text collections such as the Internet Archive opens up opportunities for time-aware exploration of their contents. In this paper, we propose time-tr...
Klaus Berberich, Srikanta J. Bedathur, Gerhard Wei...
ACNS
2010
Springer
161views Cryptology» more  ACNS 2010»
14 years 1 months ago
Multi-trail Statistical Saturation Attacks
Abstract. Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we...
Baudoin Collard, François-Xavier Standaert
NSDI
2008
14 years 8 days ago
Passport: Secure and Adoptable Source Authentication
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Xin Liu, Ang Li, Xiaowei Yang, David Wetherall
IIR
2010
13 years 11 months ago
Semantic Vectors: an Information Retrieval Scenario
In this paper we exploit Semantic Vectors to develop an IR system. The idea is to use semantic spaces built on terms and documents to overcome the problem of word ambiguity. Word ...
Pierpaolo Basile, Annalina Caputo, Giovanni Semera...