Sciweavers

1042 search results - page 73 / 209
» Failing First: An Update
Sort
View
FC
2006
Springer
147views Cryptology» more  FC 2006»
15 years 4 months ago
Timed-Release and Key-Insulated Public Key Encryption
In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release ...
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan...
99
Voted
VLDB
2000
ACM
104views Database» more  VLDB 2000»
15 years 4 months ago
The Evolution of the Web and Implications for an Incremental Crawler
In this paper we study how to build an effective incremental crawler. The crawler selectively and incrementally updates its index and/or local collection of web pages, instead of ...
Junghoo Cho, Hector Garcia-Molina
HPDC
1995
IEEE
15 years 4 months ago
A Versatile Packet Multiplexer for Quality-of-Service Networks
A novel packet multiplexing technique, called Rotating-Priority-Queues (RPQ), is presented which exploits the tradeoff between high eficiency, i.e., the ability to support many co...
Jörg Liebeherr, Dallas E. Wrege
FLAIRS
2008
15 years 3 months ago
On Using SVM and Kolmogorov Complexity for Spam Filtering
As a side effect of e-marketing strategy the number of spam e-mails is rocketing, the time and cost needed to deal with spam as well. Spam filtering is one of the most difficult t...
Sihem Belabbes, Gilles Richard
106
Voted
BPM
2008
Springer
136views Business» more  BPM 2008»
15 years 2 months ago
On the Formal Generation of Process Redesigns
Business Process Redesign (BPR) is a process oriented methodology to improve organizations. Although literature on BPR is available in abundance, little concrete support on how to ...
Mariska Netjes, Hajo A. Reijers, Wil M. P. van der...