Sciweavers

18429 search results - page 3636 / 3686
» Typing dynamic typing
Sort
View
GLOBECOM
2010
IEEE
13 years 5 months ago
Skip Finite Automaton: A Content Scanning Engine to Secure Enterprise Networks
Abstract--Today's file sharing networks are creating potential security problems to enterprise networks, i.e., the leakage of confidential documents. In order to prevent such ...
Junchen Jiang, Yi Tang, Bin Liu, Yang Xu, Xiaofei ...
INFORMATICALT
2010
145views more  INFORMATICALT 2010»
13 years 5 months ago
GSM Speech Coder Indirect Identification Algorithm
This paper presents GSM speech coder indirect identification algorithm based on sending novel identification pilot signals through the GSM speech channel. Each GSM subsystem distur...
Rajko Svecko, Bojan Kotnik, Amor Chowdhury, Zdenko...
IR
2010
13 years 5 months ago
Statistical query expansion for sentence retrieval and its effects on weak and strong queries
The retrieval of sentences that are relevant to a given information need is a challenging passage retrieval task. In this context, the well-known vocabulary mismatch problem arises...
David E. Losada
ISF
2010
273views more  ISF 2010»
13 years 5 months ago
Agents of responsibility - freelance web developers in web applications development
Much of the literature on responsibility in the IT field addresses the responsibilities of members of the IT profession. In this paper, we investigate to what extent the responsibi...
Malik Aleem Ahmed, Jeroen van den Hoven
CCS
2010
ACM
13 years 4 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
« Prev « First page 3636 / 3686 Last » Next »