Sciweavers

5869 search results - page 1025 / 1174
» Multilingual Information Access
Sort
View
DRM
2007
Springer
14 years 3 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
GCB
2007
Springer
134views Biometrics» more  GCB 2007»
14 years 3 months ago
An Application of Latent Topic Document Analysis to Large-Scale Proteomics Databases
Since the advent of public data repositories for proteomics data, readily accessible results from high-throughput experiments have been accumulating steadily. Several large-scale p...
Sebastian Klie, Lennart Martens, Juan Antonio Vizc...
IISWC
2006
IEEE
14 years 3 months ago
Modeling Cache Sharing on Chip Multiprocessor Architectures
— As CMPs are emerging as the dominant architecture for a wide range of platforms (from embedded systems and game consoles, to PCs, and to servers) the need to manage on-chip res...
Pavlos Petoumenos, Georgios Keramidas, Håkan...
DOLAP
2006
ACM
14 years 3 months ago
Towards a logical multidimensional model for spatial data warehousing and OLAP
Decision support systems (DSS) may be enhanced qualitatively if they are able to also deal with spatial dimensions and measures. Regardless the evident importance of using data wa...
Marcus Costa Sampaio, Andre Gomes de Sousa, Cl&aac...
IUI
2006
ACM
14 years 3 months ago
SWISH: semantic analysis of window titles and switching history
Information workers are often involved in multiple tasks and activities that they must perform in parallel or in rapid succession. In consequence, task management itself becomes y...
Nuria Oliver, Greg Smith, Chintan Thakkar, Arun C....
« Prev « First page 1025 / 1174 Last » Next »