Sciweavers

2702 search results - page 27 / 541
» Message from the Editor
Sort
View
IMC
2010
ACM
13 years 5 months ago
What happened in my network: mining network events from router syslogs
Router syslogs are messages that a router logs to describe a wide range of events observed by it. They are considered one of the most valuable data sources for monitoring network ...
Tongqing Qiu, Zihui Ge, Dan Pei, Jia Wang, Jun Xu
TEI
2010
ACM
120views Hardware» more  TEI 2010»
14 years 2 months ago
Using gestures on mobile phones to create SMS comics
SMS messages provide an easy and simple method to communicate with others. These short messages are useful, but can sometimes feel restricted due to the limitations of textual com...
Vidya Setlur, Agathe Battestini, Timothy Sohn, Hir...
CORR
2010
Springer
142views Education» more  CORR 2010»
13 years 7 months ago
Capacity-Equivocation Region of the Gaussian MIMO Wiretap Channel
We study the Gaussian multiple-input multiple-output (MIMO) wiretap channel, which consists of a transmitter, a legitimate user, and an eavesdropper. In this channel, the transmit...
Ersen Ekrem, Sennur Ulukus
AMI
2009
Springer
14 years 2 months ago
Getting Places: Collaborative Predictions from Status
In this paper we describe the use of collaborative filtering to make predictions about place using data from custom instant messaging status. Previous research has shown accurate ...
Mohamad Monibi, Donald J. Patterson
PKC
2005
Springer
110views Cryptology» more  PKC 2005»
14 years 1 months ago
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited
To sign with RSA, one usually encodes the message m as µ(m) and then raises the result to the private exponent modulo N. In Asiacrypt 2000, Coron et al. showed how to build a secu...
Julien Cathalo, Jean-Sébastien Coron, David...