Responding to the PIN cracking attacks from Berkman and Ostrovsky (FC 2007), we outline a simple solution called salted-PIN. A randomly generated salt value of adequate length (e.g...
In this paper we propose a methodology to learn to extract domain-specific information from large repositories (e.g. the Web) with minimum user intervention. Learning is seeded b...
Fabio Ciravegna, Alexiei Dingli, David Guthrie, Yo...
EST databases have grown exponentially in recent years and now represent the largest collection of genetic sequences. An important application of these databases is that they conta...
Jie Zheng, Timothy J. Close, Tao Jiang, Stefano Lo...
The organization and management of microprocessor storage structures (e.g., L1 caches, TLBs, etc.) is critical to the performance and energy consumption of the microprocessor. We ...
This paper attempts to define the discipline of Computational Aesthetics in the context of computer science, partly reflecting the contributions and comprehensive discussions of t...