Sciweavers

8132 search results - page 1568 / 1627
» Dependability, Abstraction, and Programming
Sort
View
IR
2008
14 years 10 months ago
An analysis on document length retrieval trends in language modeling smoothing
Abstract. Document length is widely recognized as an important factor for adjusting retrieval systems. Many models tend to favor the retrieval of either short or long documents and...
David E. Losada, Leif Azzopardi
CORR
2007
Springer
117views Education» more  CORR 2007»
14 years 10 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
ISF
2006
118views more  ISF 2006»
14 years 10 months ago
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
Abstract Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabiliti...
Ashish Arora, Anand Nandkumar, Rahul Telang
JCP
2006
90views more  JCP 2006»
14 years 10 months ago
Using LDA Method to Provide Mobile Location Estimation Services within a Cellular Radio Network
Abstract-- Mobile location estimation is becoming an important value-added service for a mobile phone operator. It is well-known that GPS can provide an accurate location estimatio...
Junyang Zhou, Joseph Kee-Yin Ng
JUCS
2008
113views more  JUCS 2008»
14 years 10 months ago
Enhancing ZRTP by using Computational Puzzles
Abstract: In this paper we present and discuss a new approach for securing multimedia communication, which is based on three innovations. The first innovation is the integration of...
Helmut Hlavacs, Wilfried N. Gansterer, Hannes Scha...
« Prev « First page 1568 / 1627 Last » Next »