Sciweavers

22128 search results - page 4411 / 4426
» Research in Structural Computing
Sort
View
SIGOPS
2010
162views more  SIGOPS 2010»
13 years 5 months ago
Visual and algorithmic tooling for system trace analysis: a case study
Despite advances in the application of automated statistical and machine learning techniques to system log and trace data there will always be a need for human analysis of machine...
Wim De Pauw, Steve Heisig
TASLP
2010
188views more  TASLP 2010»
13 years 5 months ago
MusicBox: Personalized Music Recommendation Based on Cubic Analysis of Social Tags
—Social tagging is becoming increasingly popular in music information retrieval (MIR). It allows users to tag music items like songs, albums, or artists. Social tags are valuable...
Alexandros Nanopoulos, Dimitrios Rafailidis, Panag...
TMI
2010
165views more  TMI 2010»
13 years 5 months ago
Spatio-Temporal Data Fusion for 3D+T Image Reconstruction in Cerebral Angiography
—This paper provides a framework for generating high resolution time sequences of 3D images that show the dynamics of cerebral blood flow. These sequences have the potential to ...
Andrew Copeland, Rami Mangoubi, Mukund N. Desai, S...
TON
2010
117views more  TON 2010»
13 years 5 months ago
Pricing strategies for spectrum lease in secondary markets
—We develop analytical models to characterize pricing of spectrum rights in cellular CDMA networks. Specifically, we consider a primary license holder that aims to lease its spe...
Ashraf Al Daoud, Murat Alanyali, David Starobinski
ASIACRYPT
2010
Springer
13 years 5 months ago
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SH...
Jian Guo, San Ling, Christian Rechberger, Huaxiong...
« Prev « First page 4411 / 4426 Last » Next »