Sciweavers

5973 search results - page 1129 / 1195
» Fundamental forms of information
Sort
View
CIKM
2003
Springer
14 years 2 months ago
Online duplicate document detection: signature reliability in a dynamic retrieval environment
As online document collections continue to expand, both on the Web and in proprietary environments, the need for duplicate detection becomes more critical. Few users wish to retri...
Jack G. Conrad, Xi S. Guo, Cindy P. Schriber
CRYPTO
2003
Springer
132views Cryptology» more  CRYPTO 2003»
14 years 2 months ago
On Cryptographic Assumptions and Challenges
We deal with computational assumptions needed in order to design secure cryptographic schemes. We suggest a classi£cation of such assumptions based on the complexity of falsifying...
Moni Naor
DIGRA
2003
Springer
14 years 2 months ago
"This isn't a computer game you know!": revisiting the computer games/televised war analogy
During the Gulf War of 1991, the television coverage was frequently observed to be ‘just like a video game’. This analogy primarily derived from the specific, ‘bombs-eye’ ...
Melanie Swalwell
ESOP
2003
Springer
14 years 2 months ago
A Tail-Recursive Semantics for Stack Inspections
Security folklore holds that a security mechanism based on stack inspection is incompatible with a global tail call optimization policy. An implementation of such a language may ha...
John Clements, Matthias Felleisen
EUROPAR
2003
Springer
14 years 2 months ago
RECSY - A High Performance Library for Sylvester-Type Matrix Equations
In this presentation, we give an overview of research activities at the Department of Computing Science, Ume˚a University with focus on Scientific, Parallel and High-Performance...
Isak Jonsson, Bo Kågström
« Prev « First page 1129 / 1195 Last » Next »