Sciweavers

2663 search results - page 420 / 533
» How to Choose a Timing Model
Sort
View
ICIP
2004
IEEE
14 years 10 months ago
A framework for soft hashing and its application to robust image hashing
An increasing interest in the soft hashing problem has been witnessed in recent times. Techniques implementing soft hashing intend to mirror the behaviour of cryptographic hashing...
Elizabeth P. McCarthy, Félix Balado, Guenol...
KDD
2009
ACM
166views Data Mining» more  KDD 2009»
14 years 9 months ago
Measuring the effects of preprocessing decisions and network forces in dynamic network analysis
Social networks have become a major focus of research in recent years, initially directed towards static networks but increasingly, towards dynamic ones. In this paper, we investi...
Jerry Scripps, Pang-Ning Tan, Abdol-Hossein Esfaha...
ASIACRYPT
2009
Springer
14 years 3 months ago
Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
We demonstrate how the framework that is used for creating efficient number-theoretic ID and signature schemes can be transferred into the setting of lattices. This results in cons...
Vadim Lyubashevsky
WADS
2009
Springer
223views Algorithms» more  WADS 2009»
14 years 3 months ago
Fault Tolerant External Memory Algorithms
Abstract. Algorithms dealing with massive data sets are usually designed for I/O-efficiency, often captured by the I/O model by Aggarwal and Vitter. Another aspect of dealing with ...
Gerth Stølting Brodal, Allan Grønlun...
ASWEC
2008
IEEE
14 years 3 months ago
Situated Software Development: Work Practice and Infrastructure Are Mutually Constitutive
Software developers’ work is much more interesting and multifarious in practice than formal definitions of software development processes imply. Rational models of work are ofte...
Julia Prior, Toni Robertson, John Leaney