Sciweavers

ISCI
2010
155views more  ISCI 2010»
13 years 2 months ago
User comments for news recommendation in forum-based social media
Qing Li, Jia Wang, Yuanzhu Peter Chen, Zhangxi Lin
ISCI
2010
184views more  ISCI 2010»
13 years 2 months ago
A verifiable multi-secret sharing scheme based on cellular automata
Z. Eslami, J. Zarepour Ahmadabadi
ISCI
2010
162views more  ISCI 2010»
13 years 2 months ago
A visual shape descriptor using sectors and shape context of contour lines
Shao-Hu Peng, Deok-Hwan Kim, Seok-Lyong Lee, Chin-...
ISCI
2010
146views more  ISCI 2010»
13 years 2 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
ISCI
2010
175views more  ISCI 2010»
13 years 3 months ago
Clustering web people search results using fuzzy ants
Person name queries often bring up web pages that correspond to individuals sharing the same name. The Web People Search (WePS) task consists of organizing search results for ambi...
Els Lefever, Timur Fayruzov, Véronique Host...
ISCI
2010
111views more  ISCI 2010»
13 years 3 months ago
Effective vaccination policies
We present a framework for modeling the spread of pathogens throughout a population and generating policies that minimize the impact of those pathogens on the population. This fra...
L. Shaw, W. Spears, L. Billings, P. Maxim