Sciweavers

7047 search results - page 1341 / 1410
» Focusing on Binding and Computation
Sort
View
CAISE
2004
Springer
14 years 2 months ago
An Approach to the Enterprise Integration
This paper describes the evolution and the results of the research work carried out by the IRIS group in the field of enterprise integration. This research work began with the ARD...
Ricardo Chalmeta, Reyes Grangel, Cristina Campos, ...
CCS
2004
ACM
14 years 2 months ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
14 years 2 months ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay
DSMML
2004
Springer
14 years 2 months ago
Object Recognition via Local Patch Labelling
Abstract. In recent years the problem of object recognition has received considerable attention from both the machine learning and computer vision communities. The key challenge of...
Christopher M. Bishop, Ilkay Ulusoy
ESORICS
2004
Springer
14 years 2 months ago
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
Database outsourcing is a popular industry trend which involves organizations delegating their data management needs to an external service provider. In this model, a service prov...
Einar Mykletun, Maithili Narasimha, Gene Tsudik
« Prev « First page 1341 / 1410 Last » Next »