Sciweavers

1845 search results - page 340 / 369
» From the Internet of Computers to the Internet of Things
Sort
View
MIDDLEWARE
2004
Springer
15 years 6 months ago
A Content Model for Evaluating Peer-to-Peer Searching Techniques
Simulation studies are frequently used to evaluate new peer-to-peer searching techniques as well as existing techniques on new applications. Unless these studies are accurate in th...
Brian F. Cooper
WEBDB
2004
Springer
100views Database» more  WEBDB 2004»
15 years 6 months ago
Spam, Damn Spam, and Statistics: Using Statistical Analysis to Locate Spam Web Pages
The increasing importance of search engines to commercial web sites has given rise to a phenomenon we call “web spam”, that is, web pages that exist only to mislead search eng...
Dennis Fetterly, Mark Manasse, Marc Najork
ASAP
2003
IEEE
124views Hardware» more  ASAP 2003»
15 years 6 months ago
Arbitrary Bit Permutations in One or Two Cycles
Symmetric-key block ciphers encrypt data, providing data confidentiality over the public Internet. For inter-operability reasons, it is desirable to support a variety of symmetric...
Zhijie Shi, Xiao Yang, Ruby B. Lee

Publication
322views
15 years 6 months ago
Three-dimensional point cloud recognition via distributions of geometric distances
Ageometric framework for the recognition of three-dimensional objects represented by point clouds is introducedin this paper. The proposed approach is based on comparing distribut...
Mona Mahmoudi, Guillermo Sapiro
ACMICEC
2007
ACM
148views ECommerce» more  ACMICEC 2007»
15 years 5 months ago
Pricing digital content with DRM mechanism
The Internet and file sharing technology (such as P2P network) significantly alleviate the content distribution cost. However, better digital content distribution also means that ...
Yung-Ming Li, Chia-Hao Lin