Sciweavers

5829 search results - page 997 / 1166
» The Practice of Cluster Analysis
Sort
View
DAC
2007
ACM
15 years 8 months ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
CIKM
2009
Springer
15 years 8 months ago
Suffix trees for very large genomic sequences
A suffix tree is a fundamental data structure for string searching algorithms. Unfortunately, when it comes to the use of suffix trees in real-life applications, the current metho...
Marina Barsky, Ulrike Stege, Alex Thomo, Chris Upt...
ACMIDC
2010
15 years 8 months ago
How the social structure of intercultural computer clubs fosters interactive storytelling
Stories play an important role in the collaborative project work of children and adults in intercultural computer clubs “come_IN”. They constitute the narrative framework for ...
Anne Weibert, Kai Schubert
121
Voted
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 8 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
GROUP
2007
ACM
15 years 8 months ago
The implications of enterprise-wide pipeline management tools for organizational relations and exchanges
This paper explores the impact of enterprise-wide processes and technologies on group relations and exchanges. We examine the use of Customer Relationship Management (CRM) tools i...
Melissa Cefkin, Jakita O. Thomas, Jeanette Blomber...