Sciweavers

3557 search results - page 651 / 712
» Authoring Presentation for OpenMath
Sort
View
128
Voted
IDEAS
2009
IEEE
111views Database» more  IDEAS 2009»
15 years 7 months ago
Semantics of a runtime adaptable transaction manager
Database Management Systems (DBMSs) that can be tailored to specific requirements offer the potential to improve reliability and maintainability and simultaneously the ability t...
Florian Irmert, Frank Lauterwald, Christoph P. Neu...
92
Voted
INFOCOM
2009
IEEE
15 years 7 months ago
Fighting Spam with the NeighborhoodWatch DHT
—In this paper, we present DHTBL, an anti-spam blacklist built upon a novel secure distributed hash table (DHT). We show how DHTBL can be used to replace existing DNS-based black...
Adam Bender, Rob Sherwood, Derek Monner, Nathan Go...
112
Voted
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 7 months ago
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
Abstract. “Secure Device Pairing” is the process of bootstrapping secure communication between two devices over a short- or medium-range wireless channel (such as Bluetooth, Wi...
Nitesh Saxena, Md. Borhan Uddin
118
Voted
BTW
2009
Springer
145views Database» more  BTW 2009»
15 years 7 months ago
Retrieving Metadata for Your Local Scholarly Papers
: We present a novel approach to retrieve metadata to scholarly papers stored locally as PDF files. A fingerprint is produced from the PDF fulltext to query an online metadata repo...
David Aumüller
109
Voted
CIKM
2009
Springer
15 years 7 months ago
Completing wikipedia's hyperlink structure through dimensionality reduction
Wikipedia is the largest monolithic repository of human knowledge. In addition to its sheer size, it represents a new encyclopedic paradigm by interconnecting articles through hyp...
Robert West, Doina Precup, Joelle Pineau