Sciweavers

1898 search results - page 59 / 380
» Weak Keys for IDEA
Sort
View
JERIC
2006
68views more  JERIC 2006»
13 years 8 months ago
Teaching context in information security
: This paper discusses teaching the application of technical idea through non-technical discussions, especially the use of puzzles to engage students. After discussing the need for...
Matt Bishop
SCHOLARPEDIA
2008
187views more  SCHOLARPEDIA 2008»
13 years 8 months ago
Bekenstein-Hawking entropy
We demonstrate how Sakharov's idea of induced gravity allows one to explain the statistical-mechanical origin of the entropy of a black hole. According to this idea, gravity b...
Jacob Bekenstein
ICIP
2009
IEEE
14 years 9 months ago
Security Evaluation Of Informed Watermarking Schemes
In this paper, security evaluation of an important watermarking class based on quantization is given. Theoretical developments and practical simulations are used to measure the se...
ICML
2006
IEEE
14 years 9 months ago
Fast time series classification using numerosity reduction
Many algorithms have been proposed for the problem of time series classification. However, it is clear that one-nearest-neighbor with Dynamic Time Warping (DTW) distance is except...
Xiaopeng Xi, Eamonn J. Keogh, Christian R. Shelton...
IDEAS
2005
IEEE
111views Database» more  IDEAS 2005»
14 years 2 months ago
Evaluation of Queries on Tree-Structured Data Using Dimension Graphs
The recent proliferation of XML-based standards and technologies for managing data on the Web demonstrates the need for effective and efficient management of treestructured data....
Theodore Dalamagas, Dimitri Theodoratos, Antonis K...