Sciweavers

8141 search results - page 1475 / 1629
» Higher Order Generalization
Sort
View
157
Voted
CLEF
2007
Springer
15 years 9 months ago
Amharic-English Information Retrieval with Pseudo Relevance Feedback
We describe cross language retrieval experiments using Amharic queries and English language document collection from our participation in the bilingual ad hoc track at the CLEF 20...
Atelach Alemu Argaw
148
Voted
DRM
2007
Springer
15 years 9 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
117
Voted
ECTEL
2007
Springer
15 years 9 months ago
ALOE - A Socially Aware Learning Resource and Metadata Hub
The changing nature of e-Learning, the Web, and its users that can be observed in the last years results in a need for new approaches and technologies to fully exploit the existing...
Martin Memmel, Rafael Schirru
137
Voted
EMSOFT
2007
Springer
15 years 9 months ago
Exploiting non-volatile RAM to enhance flash file system performance
Non-volatile RAM (NVRAM) such as PRAM (Phase-change RAM), FeRAM (Ferroelectric RAM), and MRAM (Magnetoresistive RAM) has characteristics of both non-volatile storage and random ac...
In Hwan Doh, Jongmoo Choi, Donghee Lee, Sam H. Noh
126
Voted
ESORICS
2007
Springer
15 years 9 months ago
Towards Modeling Trust Based Decisions: A Game Theoretic Approach
Current trust models enable decision support at an implicit level by means of thresholds or constraint satisfiability. Decision support is mostly included only for a single binary...
Vidyaraman Sankaranarayanan, Madhusudhanan Chandra...
« Prev « First page 1475 / 1629 Last » Next »