Sciweavers

1077 search results - page 90 / 216
» integration 2000
Sort
View
ASIACRYPT
2000
Springer
14 years 10 days ago
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both privacy and integrity. We consider two possible notions of authenticity for such ...
Mihir Bellare, Chanathip Namprempre
ASAP
2007
IEEE
133views Hardware» more  ASAP 2007»
14 years 52 min ago
An Efficient Hardware Support for Control Data Validation
Software-based, fine-grain control flow integrity (CFI) validation technique has been proposed to enforce control flow integrity of program execution. By validating every indirect...
Yong-Joon Park, Zhao Zhang, Gyungho Lee
EFDBS
2000
13 years 9 months ago
HERA: Automatically Generating Hypermedia Front-ends
The generation of hypermedia (or Web-based) presentations plays an important role in information management on the World Wide Web. In applications for Web modeling and querying, in...
Geert-Jan Houben
COMCOM
2000
126views more  COMCOM 2000»
13 years 7 months ago
Charging for packet-switched network communication - motivation and overview
Packet-switched network technology is expected to form the integration layer for future multi-service networks. The trend to integrate voice and data traffic can already be observe...
Martin Karsten, Jens Schmitt, Burkhard Stiller, La...
ACL
2010
13 years 6 months ago
Towards Robust Multi-Tool Tagging. An OWL/DL-Based Approach
This paper describes a series of experiments to test the hypothesis that the parallel application of multiple NLP tools and the integration of their results improves the correctne...
Christian Chiarcos