Sciweavers

511 search results - page 10 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
CLEF
2007
Springer
15 years 5 months ago
Bengali, Hindi and Telugu to English Ad-Hoc Bilingual Task at CLEF 2007
This paper presents the experiments carried out at Jadavpur University as part of participation in the CLEF 2007 ad-hoc bilingual task. This is our first participation in the CLEF...
Sivaji Bandyopadhyay, Tapabrata Mondal, Sudip Kuma...
80
Voted
IH
1998
Springer
15 years 3 months ago
An Information-Theoretic Model for Steganography
An information-theoretic model for steganography with passive adversaries is proposed. The adversary's task of distinguishing between an innocent cover message C and a modi e...
Christian Cachin
INFOCOM
2008
IEEE
15 years 6 months ago
Snoogle: A Search Engine for the Physical World
—Hardware advances will allow us to embed small devices into everyday objects such as toasters and coffee mugs, thus naturally form a wireless object network that connects the ob...
Haodong Wang, Chiu Chiang Tan, Qun Li
CIKM
2003
Springer
15 years 4 months ago
Misuse detection for information retrieval systems
We present a novel approach to detect misuse within an information retrieval system by gathering and maintaining knowledge of the behavior of the user rather than anticipating att...
Rebecca Cathey, Ling Ma, Nazli Goharian, David A. ...
94
Voted
IJAHUC
2010
130views more  IJAHUC 2010»
14 years 10 months ago
Secure traffic data propagation in Vehicular Ad Hoc Networks
: In vehicular ad hoc network, vehicles can share traffic/emergency information. The information should not be modified/manipulated during transmission without detection. We pres...
Baber Aslam, Soyoung Park, Cliff Changchun Zou, Da...