Sciweavers

674 search results - page 85 / 135
» Telephony in the Year 2005
Sort
View
CPM
2005
Springer
101views Combinatorics» more  CPM 2005»
14 years 3 months ago
Succinct Suffix Arrays Based on Run-Length Encoding
A succinct full-text self-index is a data structure built on a text T = t1t2 . . . tn, which takes little space (ideally close to that of the compressed text), permits efficient se...
Veli Mäkinen, Gonzalo Navarro
CTRSA
2005
Springer
79views Cryptology» more  CTRSA 2005»
14 years 3 months ago
Malicious Cryptography: Kleptographic Aspects
Abstract. In the last few years we have concentrated our research efforts on new threats to the computing infrastructure that are the result of combining malicious software (malwar...
Adam Young, Moti Yung
DAGM
2005
Springer
14 years 3 months ago
Object Categorization and the Need for Many-to-Many Matching
Abstract. Object recognition systems have their roots in the AI community, and originally addressed the problem of object categorization. These early systems, however, were limited...
Sven J. Dickinson, Ali Shokoufandeh, Yakov Keselma...
DAWAK
2005
Springer
14 years 3 months ago
Optimizing a Sequence of Frequent Pattern Queries
Discovery of frequent patterns is a very important data mining problem with numerous applications. Frequent pattern mining is often regarded as advanced querying where a user speci...
Mikolaj Morzy, Marek Wojciechowski, Maciej Zakrzew...
DIGRA
2005
Springer
14 years 3 months ago
Learning Games as a Platform for Simulated Science Practice
In recent years, science education has been the focus of study and development of new gamebased learning environments. It has been argued that active and critical learning about r...
Rikke Magnussen