Sciweavers

840 search results - page 135 / 168
» XML: From Practice to Theory
Sort
View
CORR
2007
Springer
147views Education» more  CORR 2007»
13 years 7 months ago
Coding Solutions for the Secure Biometric Storage Problem
—The paper studies the problem of securely storing biometric passwords, such as fingerprints and irises. With the help of coding theory Juels and Wattenberg derived in 1999 a sc...
Davide Schipani, Joachim Rosenthal
JCM
2006
112views more  JCM 2006»
13 years 7 months ago
A Peer-to-Peer Cooperation Enhancement Scheme and its Performance Analysis
The performance of peer-to-peer systems depends on the level of cooperation of the system's participants. While most existing peer-to-peer architectures have assumed that user...
Wei-Cherng Liao, Fragkiskos Papadopoulos, Konstant...
JFP
2006
119views more  JFP 2006»
13 years 7 months ago
Gencel: a program generator for correct spreadsheets
A huge discrepancy between theory and practice exists in one popular application area of functional programming--spreadsheets. Although spreadsheets are the most frequently used (...
Martin Erwig, Robin Abraham, Steve Kollmansberger,...
IOR
2007
95views more  IOR 2007»
13 years 7 months ago
Index Policies for Shooting Problems
We consider a scenario in which a single Red wishes to shoot at a collection of Blue targets, one at a time, to maximise some measure of return obtained from Blues killed before R...
Kevin D. Glazebrook, Christopher Kirkbride, H. M. ...
VIROLOGY
2008
121views more  VIROLOGY 2008»
13 years 7 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...