Sciweavers

858 search results - page 42 / 172
» One Is Enough!
Sort
View
JSS
2006
66views more  JSS 2006»
13 years 8 months ago
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
Recently, a new domino signal encryption algorithm (DSEA) was proposed for digital signal transmission, especially for digital images and videos. This paper analyzes the security ...
Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
IFM
2010
Springer
183views Formal Methods» more  IFM 2010»
13 years 6 months ago
Certified Absence of Dangling Pointers in a Language with Explicit Deallocation
Safe is a first-order eager functional language with facilities for programmer controlled destruction and copying of data structures. It provides also regions, i.e. disjoint parts...
Javier de Dios, Manuel Montenegro, Ricardo Pe&ntil...
CSCW
2012
ACM
12 years 4 months ago
Recommending routes in the context of bicycling: algorithms, evaluation, and the value of personalization
Users have come to rely on automated route finding services for driving, public transit, walking, and bicycling. Current state of the art route finding algorithms typically rely...
Reid Priedhorsky, David Pitchford, Shilad Sen, Lor...
PE
2008
Springer
106views Optimization» more  PE 2008»
13 years 8 months ago
Heavy traffic analysis of polling models by mean value analysis
In this paper we present a new approach to derive heavy-traffic asymptotics for polling models. We consider the classical cyclic polling model with exhaustive or gated service at ...
Robert D. van der Mei, Erik M. M. Winands
IUI
2009
ACM
14 years 5 months ago
Intelligently creating and recommending reusable reformatting rules
When users combine data from multiple sources into a spreadsheet or dataset, the result is often a mishmash of different formats, since phone numbers, dates, course numbers and ot...
Christopher Scaffidi, Brad A. Myers, Mary Shaw