Sciweavers

1077 search results - page 90 / 216
» integration 2000
Sort
View
151
Voted
ASIACRYPT
2000
Springer
15 years 7 months ago
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both privacy and integrity. We consider two possible notions of authenticity for such ...
Mihir Bellare, Chanathip Namprempre
128
Voted
ASAP
2007
IEEE
133views Hardware» more  ASAP 2007»
15 years 6 months ago
An Efficient Hardware Support for Control Data Validation
Software-based, fine-grain control flow integrity (CFI) validation technique has been proposed to enforce control flow integrity of program execution. By validating every indirect...
Yong-Joon Park, Zhao Zhang, Gyungho Lee
125
Voted
EFDBS
2000
15 years 4 months ago
HERA: Automatically Generating Hypermedia Front-ends
The generation of hypermedia (or Web-based) presentations plays an important role in information management on the World Wide Web. In applications for Web modeling and querying, in...
Geert-Jan Houben
102
Voted
COMCOM
2000
126views more  COMCOM 2000»
15 years 2 months ago
Charging for packet-switched network communication - motivation and overview
Packet-switched network technology is expected to form the integration layer for future multi-service networks. The trend to integrate voice and data traffic can already be observe...
Martin Karsten, Jens Schmitt, Burkhard Stiller, La...
114
Voted
ACL
2010
15 years 19 days ago
Towards Robust Multi-Tool Tagging. An OWL/DL-Based Approach
This paper describes a series of experiments to test the hypothesis that the parallel application of multiple NLP tools and the integration of their results improves the correctne...
Christian Chiarcos