Sciweavers

6050 search results - page 931 / 1210
» Information In The Non-Stationary Case
Sort
View
SIGIR
2003
ACM
15 years 6 months ago
Analysis of anchor text for web search
It has been observed that anchor text in web documents is very useful in improving the quality of web text search for some classes of queries. By examining properties of anchor te...
Nadav Eiron, Kevin S. McCurley
WMASH
2003
ACM
15 years 6 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
COLT
2003
Springer
15 years 6 months ago
Learning All Subfunctions of a Function
Sublearning, a model for learning of subconcepts of a concept, is presented. Sublearning a class of total recursive functions informally means to learn all functions from that cla...
Sanjay Jain, Efim B. Kinber, Rolf Wiehagen
79
Voted
CRYPTO
2003
Springer
90views Cryptology» more  CRYPTO 2003»
15 years 6 months ago
Password Interception in a SSL/TLS Channel
Simple password authentication is often used e.g. from an email software application to a remote IMAP server. This is frequently done in a protected peer-to-peer tunnel, e.g. by SS...
Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Ma...
88
Voted
DSOM
2003
Springer
15 years 6 months ago
Automating Enterprise Application Placement in Resource Utilities
Abstract. Enterprise applications implement business resource management systems, customer relationship management systems, and general systems for commerce. These applications rel...
Jerry Rolia, Artur Andrzejak, Martin F. Arlitt