Sciweavers

5863 search results - page 1007 / 1173
» An evaluation of the TRIPS computer system
Sort
View
PERCOM
2005
ACM
16 years 1 months ago
Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants
Encryption algorithms can be used to help secure wireless communications, but securing data also consumes resources. The goal of this research is to provide users or system develo...
Creighton T. R. Hager, Scott F. Midkiff, Jung Min ...
EWSN
2008
Springer
16 years 1 months ago
Discovery of Frequent Distributed Event Patterns in Sensor Networks
Today it is possible to deploy sensor networks in the real world and collect large amounts of raw sensory data. However, it remains a major challenge to make sense of sensor data, ...
Kay Römer
SDM
2009
SIAM
125views Data Mining» more  SDM 2009»
15 years 11 months ago
Providing Privacy through Plausibly Deniable Search.
Query-based web search is an integral part of many people’s daily activities. Most do not realize that their search history can be used to identify them (and their interests). I...
Chris Clifton, Mummoorthy Murugesan
ECIR
2009
Springer
15 years 11 months ago
Integrating Proximity to Subjective Sentences for Blog Opinion Retrieval
Opinion finding is a challenging retrieval task, where it has been shown that it is especially difficult to improve over a strongly performing topic-relevance baseline. In this pa...
Rodrygo L. T. Santos, Ben He, Craig Macdonald, Iad...
WISE
2009
Springer
15 years 11 months ago
Entry Pairing in Inverted File
Abstract. This paper proposes to exploit content and usage information to rearrange an inverted index for a full-text IR system. The idea is to merge the entries of two frequently ...
Hoang Thanh Lam, Raffaele Perego, Nguyen Thoi Minh...
« Prev « First page 1007 / 1173 Last » Next »