Sciweavers

1734 search results - page 325 / 347
» its 2000
Sort
View
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
14 years 29 days ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux
DSOM
2000
Springer
14 years 29 days ago
A Scalable Architecture for Monitoring and Visualizing Multicast Statistics
An understanding of certain network functions is critical for successful network management. Managers must have insight into network topology, protocol performance and fault detec...
Prashant Rajvaidya, Kevin C. Almeroth, Kimberly C....
ECAI
2000
Springer
14 years 29 days ago
Gaining Insights into Web Customers using Web Intelligence
The web is fast maturing into an important marketing medium that provides businesses with the ability to undertake oneto-one marketing and provide personalised services to their cu...
Sarabjot S. Anand, Matthias Baumgarten, Alex G. B&...
ECAI
2000
Springer
14 years 29 days ago
Flexible Text Classification for Financial Applications: The Facile System
This paper describes an advanced system for multilingual text classification adaptable to different user needs. The system has been initially developed as an applied research proje...
Fabio Ciravegna, Alberto Lavelli, Nadia Mana, Joha...
EDBT
2000
ACM
14 years 28 days ago
Persistent Client-Server Database Sessions
Database systems support recovery, providing high database availability. However, database applications may lose work because of a server failure. In particular, if a database serv...
Roger S. Barga, David B. Lomet, Thomas Baby, Sanja...