Sciweavers

1016 search results - page 155 / 204
» Explore or Exploit
Sort
View
INTEGRATION
2007
98views more  INTEGRATION 2007»
13 years 7 months ago
Hashchip: A shared-resource multi-hash function processor architecture on FPGA
The ubiquitous presence of mobile devices and the demand for better performance and efficiency have motivated research into embedded implementations of cryptography algorithms. I...
T. S. Ganesh, Michael T. Frederick, T. S. B. Sudar...
TIFS
2008
179views more  TIFS 2008»
13 years 7 months ago
Blind Identification of Source Cell-Phone Model
The various image-processing stages in a digital camera pipeline leave telltale footprints, which can be exploited as forensic signatures. These footprints consist of pixel defects...
Oya Çeliktutan, Bülent Sankur, Ismail ...
JASIS
2007
101views more  JASIS 2007»
13 years 7 months ago
Mining Web functional dependencies for flexible information access
We present an approach to enhancing information access through web structure mining in contrast to traditional approaches involving usage mining. Specifically, we mine the hardwi...
Saverio Perugini, Naren Ramakrishnan
TMM
2008
112views more  TMM 2008»
13 years 7 months ago
Multimodal News Story Clustering With Pairwise Visual Near-Duplicate Constraint
Story clustering is a critical step for news retrieval, topic mining, and summarization. Nonetheless, the task remains highly challenging owing to the fact that news topics exhibit...
Xiao Wu, Chong-Wah Ngo, Alexander G. Hauptmann
JCP
2007
132views more  JCP 2007»
13 years 7 months ago
A Theoretical Framework for Organizational Network Forensic Readiness
This paper discusses breaking the escalation cycle that locks cyber intruders and their targets in a state where targets are perennially resigned to attacks and intruders are at...
Barbara Endicott-Popovsky, Deborah A. Frincke, Car...