Sciweavers

2754 search results - page 209 / 551
» Competitive recommendation systems
Sort
View
SACRYPT
2001
Springer
126views Cryptology» more  SACRYPT 2001»
15 years 8 months ago
Analysis of the E0 Encryption System
The encryption system E0, which is the encryption system used in the Bluetooth specification, is examined. In the current paper, a method of deriving the cipher key from a set of ...
Scott R. Fluhrer, Stefan Lucks
ACSE
2000
ACM
15 years 8 months ago
A streamlined system for building online presentation archives using SMIL
The demand for and expectation of ubiquitous access to multimedia online learning resources are much higher amongst computer science students than other fields of study. Previous ...
Darren James, Jane Hunter
ICDE
2010
IEEE
145views Database» more  ICDE 2010»
15 years 8 months ago
MASS: a multi-facet domain-specific influential blogger mining system
With rapid development of web 2.0 technology and e-business, bloggers play significant roles in the blogosphere as well as the external world. In particular, influential bloggers c...
Yichuan Cai, Yi Chen
ICAIL
2007
ACM
15 years 5 months ago
P2P systems in legal networks: another "small world" case
The “small world”-paradigm offers a new interesting viewpoint for the analysis of contemporary legal networks and artificial intelligence. This topological approach sheds fu...
Ugo Pagallo, Giancarlo Ruffo
COMAD
2008
15 years 5 months ago
Silverfish: A Contextual Knowledge Extraction and Aggregation System for Academics
Repositories like arXiv1 and knowledge bases like CiteSeer2 are increasingly becoming central to academicians and researchers. However, current systems provide too little semantic...
Srinath Srinivasa, Aditya Ramana Rachakonda