Sciweavers

516 search results - page 63 / 104
» Sets of k-Independent Strings
Sort
View
ICMCS
2006
IEEE
91views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Detecting Changes in User-Centered Music Query Streams
In this paper, we propose an efficient algorithm, called MQSchange (changes of Music Query Streams), to detect the changes of maximal melody structures in user-centered music quer...
Hua-Fu Li, Man-Kwan Shan, Suh-Yin Lee
ICDCIT
2005
Springer
14 years 2 months ago
FlexiRank: An Algorithm Offering Flexibility and Accuracy for Ranking the Web Pages
The existing search engines sometimes give unsatisfactory search result for lack of any categorization. If there is some means to know the preference of user about the search resul...
Debajyoti Mukhopadhyay, Pradipta Biswas
TCC
2004
Springer
101views Cryptology» more  TCC 2004»
14 years 2 months ago
Implementing Oblivious Transfer Using Collection of Dense Trapdoor Permutations
Abstract. Until recently, the existence of collection of trapdoor permutations (TDP) was believed (and claimed) to imply almost all of the major cryptographic primitives, including...
Iftach Haitner
IEEEARES
2010
IEEE
14 years 2 months ago
Heuristics for Detecting Botnet Coordinated Attacks
— This paper studies the analysis on the Cyber Clean Center (CCC) Data Set 2009, consisting of raw packets captured more than 90 independent honeypots, in order for detecting beh...
Kazuya Kuwabara, Hiroaki Kikuchi, Masato Terada, M...
CRYPTO
2003
Springer
173views Cryptology» more  CRYPTO 2003»
14 years 1 months ago
A Tweakable Enciphering Mode
We describe a block-cipher mode of operation, CMC, that turns an n-bit block cipher into a tweakable enciphering scheme that acts on strings of mn bits, where m ≥ 2. When the und...
Shai Halevi, Phillip Rogaway