Sciweavers

2201 search results - page 269 / 441
» Improvement of ASIC Design Processes
Sort
View
IACR
2011
192views more  IACR 2011»
14 years 4 months ago
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
Hummingbird-2 is an encryption algorithm with a 128-bit secret key and a 64-bit initialization vector. Hummingbird-2 optionally produces an authentication tag for each message proc...
Daniel Engels, Markku-Juhani O. Saarinen, Peter Sc...
WSDM
2012
ACM
258views Data Mining» more  WSDM 2012»
14 years 3 days ago
Large-scale analysis of individual and task differences in search result page examination strategies
Understanding the impact of individual and task differences on search result page examination strategies is important in developing improved search engines. Characterizing these e...
Georg Buscher, Ryen W. White, Susan T. Dumais, Jef...
ACMICEC
2007
ACM
154views ECommerce» more  ACMICEC 2007»
15 years 8 months ago
Learning and adaptivity in interactive recommender systems
Recommender systems are intelligent E-commerce applications that assist users in a decision-making process by offering personalized product recommendations during an interaction s...
Tariq Mahmood, Francesco Ricci
CCR
1999
92views more  CCR 1999»
15 years 4 months ago
YESSIR: a simple reservation mechanism for the Internet
Abstract-RSVP has been designed to support resource reservation in the Internet. However, it has two major problems: complexity and scalability. The former results in large message...
Ping Pan, Henning Schulzrinne
AGIS
2008
319views more  AGIS 2008»
15 years 4 months ago
An Efficient Algorithm for Raster-to-Vector Data Conversion
Data conversion from raster to vector (R2V) is a key function in Geographic Information Systems (GIS) and remote sensing (RS) image processing for integrating GIS and RS data. The...
Junhua Teng, Fahui Wang, Yu Liu