Sciweavers

4378 search results - page 769 / 876
» An Evaluation Measure for Distributed Information Retrieval ...
Sort
View
SIGMOD
2008
ACM
198views Database» more  SIGMOD 2008»
15 years 10 months ago
Efficient storage scheme and query processing for supply chain management using RFID
As the size of an RFID tag becomes smaller and the price of the tag gets lower, RFID technology has been applied to a wide range of areas. Recently, RFID has been adopted in the b...
Chun-Hee Lee, Chin-Wan Chung
DOCENG
2010
ACM
14 years 11 months ago
FormCracker: interactive web-based form filling
Filling out document forms distributed by email or hosted on the Web is still problematic and usually requires a printer and scanner. Users commonly download and print forms, fill...
Laurent Denoue, John Adcock, Scott Carter, Patrick...
CCS
2008
ACM
14 years 12 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
CW
2003
IEEE
15 years 3 months ago
Utilizing Statistical Characteristics of N-grams for Intrusion Detection
Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more...
Zhuowei Li, Amitabha Das, Sukumar Nandi
ADC
2007
Springer
93views Database» more  ADC 2007»
15 years 2 months ago
A Heuristic Approach to Cost-Efficient Derived Horizontal Fragmentation of Complex Value Databases
Derived horizontal fragmentation is one of the main database distribution design techniques. Unlike primary horizontal fragmentation, the decision of derived horizontal fragmentat...
Hui Ma, Klaus-Dieter Schewe, Qing Wang