Sciweavers

2795 search results - page 460 / 559
» Recommended or Not
Sort
View
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
13 years 5 months ago
Differential Attack on Five Rounds of the SC2000 Block Cipher
The SC2000 block cipher has a 128-bit block size and a user key of 128, 192 or 256 bits, which employs a total of 6.5 rounds if a 128bit user key is used. It is a CRYPTREC recommen...
Jiqiang Lu
DOCENG
2009
ACM
13 years 5 months ago
Relating declarative hypermedia objects and imperative objects through the NCL glue language
This paper focuses on the support provided by NCL (Nested Context Language) to relate objects with imperative code content and declarative hypermedia-objects (objects with declara...
Luiz Fernando Gomes Soares, Marcelo Ferreira Moren...
ENTER
2009
Springer
13 years 5 months ago
An Automated Approach for Deriving Semantic Annotations of Tourism Products based on Geospatial Information
High quality product data is a necessary prerequisite for supporting efficient browsing and recommendation procedures on e-commerce platforms. This is especially true for the tour...
Markus Zanker, Matthias Fuchs, Alexander Seebacher...
HCI
2009
13 years 5 months ago
Adaptive Learning via Social Cognitive Theory and Digital Cultural Ecosystems
This paper will look at the human predisposition to oral tradition and its effectiveness as a learning tool to convey mission-critical information. After exploring the effectivenes...
Joseph Juhnke, Adam R. Kallish
ICEBE
2009
IEEE
157views Business» more  ICEBE 2009»
13 years 5 months ago
Trust-Based Access Control for Privacy Protection in Collaborative Environment
Privacy has been acknowledged to be a critical requirement for many business environments. A variety of uncertainty and mutability poses challenges when sharing resources must happ...
Min Li, Hua Wang, David Ross