Sciweavers

927 search results - page 153 / 186
» A comparison of two approaches to pseudorandomness
Sort
View
SECON
2008
IEEE
15 years 6 months ago
Predictive or Oblivious: A Comparative Study of Routing Strategies for Wireless Mesh Networks under Uncertain Demand
—Traffic routing plays a critical role in determining the performance of a wireless mesh network. To investigate the best solution, existing work proposes to formulate the mesh ...
Jonathan Wellons, Liang Dai, Yuan Xue, Yi Cui
CCS
2005
ACM
15 years 5 months ago
Direct chosen ciphertext security from identity-based techniques
We describe a new encryption technique that is secure in the standard model against adaptive chosen ciphertext (CCA2) attacks. We base our method on two very efficient Identity-Ba...
Xavier Boyen, Qixiang Mei, Brent Waters
GFKL
2005
Springer
142views Data Mining» more  GFKL 2005»
15 years 5 months ago
Near Similarity Search and Plagiarism Analysis
Abstract. Existing methods to text plagiarism analysis mainly base on “chunking”, a process of grouping a text into meaningful units each of which gets encoded by an integer nu...
Benno Stein, Sven Meyer zu Eissen
AGP
2003
IEEE
15 years 5 months ago
Solving Hard Disjunctive Logic Programs Faster (Sometimes)
Disjunctive Logic Programming (DLP) under the consistent answer set semantics is an advanced formalism for knowledge representation and reasoning. It is, under widely believed assu...
Gerald Pfeifer
ECIR
2007
Springer
15 years 1 months ago
Combination of Document Priors in Web Information Retrieval
Query-independent features (also called document priors), such as the number of incoming links to a document, its Page-Rank, or the type of its associated URL, have been successfu...
Jie Peng, Iadh Ounis