Sciweavers

725 search results - page 135 / 145
» heuristics 2010
Sort
View
CRYPTO
2010
Springer
157views Cryptology» more  CRYPTO 2010»
13 years 11 months ago
Correcting Errors in RSA Private Keys
Abstract. Let pk = (N , e) be an RSA public key with corresponding secret key sk = (p, q, d, dp, dq , q-1 p ). Assume that we obtain partial error-free information of sk, e.g., ass...
Wilko Henecka, Alexander May, Alexander Meurer
DOCENG
2010
ACM
13 years 11 months ago
FormCracker: interactive web-based form filling
Filling out document forms distributed by email or hosted on the Web is still problematic and usually requires a printer and scanner. Users commonly download and print forms, fill...
Laurent Denoue, John Adcock, Scott Carter, Patrick...
HPDC
2010
IEEE
13 years 11 months ago
Reshaping text data for efficient processing on Amazon EC2
Text analysis tools are nowadays required to process increasingly large corpora which are often organized as small files (abstracts, news articles, etc). Cloud computing offers a ...
Gabriela Turcu, Ian T. Foster, Svetlozar Nestorov
ICFP
2010
ACM
13 years 11 months ago
Matching lenses: alignment and view update
Bidirectional programming languages are a practical approach to the view update problem. Programs in these languages, called lenses, define both a view and an update policy--i.e.,...
Davi M. J. Barbosa, Julien Cretin, Nate Foster, Mi...
MM
2010
ACM
151views Multimedia» more  MM 2010»
13 years 10 months ago
Enhanced exploration of oral history archives through processed video and synchronized text transcripts
A digital video library of over 900 hours of video and 18000 stories from The HistoryMakers was used by 266 students, faculty, librarians, and life-long learners interacting with ...
Michael G. Christel, Scott M. Stevens, Bryan Maher...