Sciweavers

1040 search results - page 146 / 208
» TCAM-conscious Algorithms for Data Streams
Sort
View
SP
2000
IEEE
117views Security Privacy» more  SP 2000»
14 years 1 months ago
Practical Techniques for Searches on Encrypted Data
It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that ...
Dawn Xiaodong Song, David Wagner, Adrian Perrig
CORR
2008
Springer
158views Education» more  CORR 2008»
13 years 9 months ago
Declarative Combinatorics: Isomorphisms, Hylomorphisms and Hereditarily Finite Data Types in Haskell
This paper is an exploration in a functional programming framework of isomorphisms between elementary data types (natural numbers, sets, finite functions, permutations binary deci...
Paul Tarau
ANCS
2007
ACM
14 years 1 months ago
Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia
The importance of network security has grown tremendously and a collection of devices have been introduced, which can improve the security of a network. Network intrusion detectio...
Sailesh Kumar, Balakrishnan Chandrasekaran, Jonath...
NOSSDAV
2009
Springer
14 years 3 months ago
Zebroid: using IPTV data to support peer-assisted VoD content delivery
P2P file transfers and streaming have already seen a tremendous growth in Internet applications. With the rapid growth of IPTV, the need to efficiently disseminate large volumes ...
Yih-Farn Robin Chen, Rittwik Jana, Daniel Stern, B...
ICPR
2010
IEEE
14 years 11 days ago
An Empirical Study of Feature Extraction Methods for Audio Classification
With the growing popularity of video sharing web sites and the increasing use of consumer-level video capture devices, new algorithms are needed for intelligent searching and inde...
Charles Parker