Sciweavers

6906 search results - page 21 / 1382
» An algorithm for modelling key terms
Sort
View
53
Voted
EMNLP
2007
14 years 11 months ago
Inducing Search Keys for Name Filtering
This paper describes ETK (Ensemble of Transformation based Keys) a new algorithm for inducing search keys for name filtering. ETK has the low computational cost and ability to ...
Karl Branting
CNSR
2008
IEEE
214views Communications» more  CNSR 2008»
15 years 4 months ago
HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
15 years 3 months ago
Public-Key-Infrastructure Based on a Peer-to-Peer Network
The goal of a Public-Key-Infrastructure (PKI) is to prove whether a cryptographic public key is authentic for a certain user. This information is crucial for the reliability of as...
Thomas Wölfl
ICPPW
1999
IEEE
15 years 1 months ago
Performance Evaluation of Public-Key Certificate Revocation System with Balanced Hash Tree
A new method for updating certificate revocation trees (CRT) is proposed. Efficient revocation of publickey certificates is a current issue in public-key Infrastructure because a ...
Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi
PODS
1989
ACM
155views Database» more  PODS 1989»
15 years 1 months ago
Fractals for Secondary Key Retrieval
In this paper we propose the use of fractals and especially the Hilbert curve, in order to design good distance-preserving mappings. Such mappings improve the performance of secon...
Christos Faloutsos, Shari Roseman