Sciweavers

960 search results - page 109 / 192
» There's no Data like More Data
Sort
View
IPPS
2007
IEEE
14 years 3 months ago
Peak-Performance DFA-based String Matching on the Cell Processor
The security of your data and of your network is in the hands of intrusion detection systems, virus scanners and spam filters, which are all critically based on string matching. ...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
HICSS
2006
IEEE
96views Biometrics» more  HICSS 2006»
14 years 3 months ago
When Online Reviews Meet Hyperdifferentiation: A Study of Craft Beer Industry
We analyze how online reviews can be used to evaluate product differentiation strategy based on the theories of hyperdifferentiation and resonance marketing. Hyperdifferentiation ...
Eric K. Clemons, Guodong Gao, Lorin M. Hitt
ICDE
2006
IEEE
115views Database» more  ICDE 2006»
14 years 3 months ago
Integration Workbench: Integrating Schema Integration Tools
A key aspect of any data integration endeavor is establishing a transformation that translates instances of one or more source schemata into instances of a target schema. This sch...
Peter Mork, Arnon Rosenthal, Leonard J. Seligman, ...
ITNG
2006
IEEE
14 years 3 months ago
Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptogr
Worldwide symmetric encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard), and EES (Escrowed Encryption Standard), have been – and some...
Dragos Trinca
IPPS
2005
IEEE
14 years 2 months ago
On the Impact of IPsec on Interactive Communications
Interactive communication services as telephony and video-conferences use the infrastructure of existing LANs and the Internet more and more. The advantages are obvious. For examp...
Jirka Klaue, Andreas Hess