Sciweavers

26354 search results - page 80 / 5271
» How we refactor, and how we know it
Sort
View
CRYPTO
2009
Springer
119views Cryptology» more  CRYPTO 2009»
14 years 3 months ago
How Risky Is the Random-Oracle Model?
RSA-FDH and many other schemes secure in the Random-Oracle Model (ROM) require a hash function with output size larger than standard sizes. We show that the random-oracle instanti...
Gaëtan Leurent, Phong Q. Nguyen
COLCOM
2008
IEEE
14 years 3 months ago
Collaborative Search and User Privacy: How Can They Be Reconciled?
Abstract. Collaborative search engines (CSE) let users pool their resources and share their experiences when seeking information on the web. However, when shared, search terms and ...
Thorben Burghardt, Erik Buchmann, Klemens Böh...
PIMRC
2008
IEEE
14 years 3 months ago
Designing PSAM schemes: How optimal are SISO pilot parameters for spatially correlated SIMO?
Abstract-We study the design parameters of pilot-symbolassisted modulation (PSAM) schemes for spatially correlated single-input multiple-output (SIMO) systems in time-varying Gauss...
Xiangyun Zhou, Tharaka A. Lamahewa, Parastoo Sadeg...
DASFAA
2006
IEEE
121views Database» more  DASFAA 2006»
14 years 3 months ago
A Precise Metric for Measuring How Much Web Pages Change
A number of similarity metrics have been used to measure the degree of web page changes in the literature. When a web page changes, the metrics often represent the change different...
Shin Young Kwon, Sang Ho Lee, Sung Jin Kim
SOFTVIS
2006
ACM
14 years 3 months ago
How do changes in buggy Mozilla files propagate?
We demonstrate the use of the CVSgrab tool for assessing change propagation in the Open Source browser Firefox.
Lucian Voinea, Alexandru Telea