Sciweavers

1006 search results - page 110 / 202
» What is this page known for
Sort
View
HICSS
2009
IEEE
104views Biometrics» more  HICSS 2009»
14 years 3 months ago
Multiple Social Networks Analysis of FLOSS Projects using Sargas
Due to their characteristics and claimed advantages, several researchers have been investigating free and open-source projects. Different aspects are being studied: for instance, ...
Samuel Felix de Sousa Jr., Marco Antonio Balieiro,...
ICDAR
2009
IEEE
14 years 3 months ago
Evaluating Retraining Rules for Semi-Supervised Learning in Neural Network Based Cursive Word Recognition
Training a system to recognize handwritten words is a task that requires a large amount of data with their correct transcription. However, the creation of such a training set, inc...
Volkmar Frinken, Horst Bunke
SP
2009
IEEE
128views Security Privacy» more  SP 2009»
14 years 3 months ago
Quantifying Information Leaks in Outbound Web Traffic
As the Internet grows and network bandwidth continues to increase, administrators are faced with the task of keeping confidential information from leaving their networks. Today’...
Kevin Borders, Atul Prakash
INFOCOM
2009
IEEE
14 years 3 months ago
SDL Constructions of FIFO, LIFO and Absolute Contractors
— Despite all the recent advances in the mathematical theories for constructing optical queues by optical Switches and fiber Delay Lines (SDL), there are still many problems tha...
Cheng-Shang Chang, Jay Cheng, Duan-Shin Lee
SACRYPT
2009
Springer
130views Cryptology» more  SACRYPT 2009»
14 years 3 months ago
Format-Preserving Encryption
Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of identical format—for example, encrypting a valid credit-card number into a ...
Mihir Bellare, Thomas Ristenpart, Phillip Rogaway,...