Sciweavers

3544 search results - page 479 / 709
» Information Security in Open Systems
Sort
View
RIAO
2007
15 years 1 months ago
Using a Content-and-Structure Oriented Method for Relevance Feedback in XML Retrieval
As opposed to traditional Information Retrieval (IR) which views whole documents as atomic units of retrieval, XML IR processes XML elements as possible units of retrieval. Many o...
Lobna Hlaoua, Mohand Boughanem, Karen Pinel-Sauvag...
SIGIR
2012
ACM
13 years 2 months ago
Evaluating aggregated search pages
Aggregating search results from a variety of heterogeneous sources or verticals such as news, image and video into a single interface is a popular paradigm in web search. Although...
Ke Zhou, Ronan Cummins, Mounia Lalmas, Joemon M. J...
ICPR
2002
IEEE
15 years 4 months ago
Real-Time Cooperative Multi-Target Tracking by Communicating Active Vision Agents
Abstract Target detection and tracking is one of the most important and fundamental technologies to develop real world computer vision systems such as security and traffic monitori...
Norimichi Ukita, Takashi Matsuyama
APLAS
2007
ACM
15 years 3 months ago
More Typed Assembly Languages for Confidentiality
We propose a series of type systems for the information-flow security of assembly code. These systems extend previous work TALC with some timing annotations and associated judgment...
Dachuan Yu
USENIX
2001
15 years 1 months ago
Heimdal and Windows 2000 Kerberos - How to Get Them to Play Together
As a practical means of achieving better security and single sign-on, the Kerberos network authentication system has been in wide use in the Unix world for many years. Microsoft h...
Assar Westerlund, Johan Danielsson