Sciweavers

20175 search results - page 95 / 4035
» Is abstraction the key to computing
Sort
View
95
Voted
EUROCRYPT
2001
Springer
15 years 5 months ago
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Abstract. We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys som...
Ran Canetti, Hugo Krawczyk
ECAI
2006
Springer
15 years 4 months ago
Disambiguating Personal Names on the Web Using Automatically Extracted Key Phrases
Abstract. When you search for information regarding a particular person on the web, a search engine returns many pages. Some of these pages may be for people with the same name. Ho...
Danushka Bollegala, Yutaka Matsuo, Mitsuru Ishizuk...
119
Voted
ECAI
2008
Springer
15 years 2 months ago
Finding Key Bloggers, One Post At A Time
Abstract. User generated content in general, and blogs in particular, form an interesting and relatively little explored domain for mining knowledge. We address the task of blog di...
Wouter Weerkamp, Krisztian Balog, Maarten de Rijke
96
Voted
IFIP
2010
Springer
14 years 10 months ago
MBAC: Impact of the Measurement Error on Key Performance Issues
Abstract. In Measurement Based Admission Control (MBAC), the decision of accepting or rejecting a new ow is based on measurements of the current trac situation. Since MBAC relies o...
Anne Nevin, Peder J. Emstad, Yuming Jiang
62
Voted
ICPR
2004
IEEE
16 years 1 months ago
Optimal Inference for Hierarchical Skeleton Abstraction
Alexandru Telea, Cristian Sminchisescu, Sven J. Di...