Sciweavers

2209 search results - page 269 / 442
» Language Based Secure Communication
Sort
View
119
Voted
CCS
2009
ACM
15 years 10 months ago
As-awareness in Tor path selection
Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an a...
Matthew Edman, Paul F. Syverson
119
Voted
SPEECH
2010
102views more  SPEECH 2010»
14 years 10 months ago
Non-native speech perception in adverse conditions: A review
If listening in adverse conditions is hard, then listening in a foreign language is doubly so: non-native listeners have to cope with both imperfect signals and imperfect knowledg...
Maria Luisa Garcia Lecumberri, Martin Cooke, Anne ...
235
Voted
ICDE
2008
IEEE
166views Database» more  ICDE 2008»
16 years 5 months ago
A Clustered Index Approach to Distributed XPath Processing
Supporting top-k queries over distributed collections of schemaless XML data poses two challenges. While XML supports expressive query languages such as XPath and XQuery, these la...
Georgia Koloniari, Evaggelia Pitoura
137
Voted
WWW
2005
ACM
16 years 4 months ago
Named graphs, provenance and trust
The Semantic Web consists of many RDF graphs nameable by URIs. This paper extends the syntax and semantics of RDF to cover such Named Graphs. This enables RDF statements that desc...
Jeremy J. Carroll, Christian Bizer, Patrick J. Hay...
130
Voted
PET
2007
Springer
15 years 9 months ago
Enforcing P3P Policies Using a Digital Rights Management System
The protection of privacy has gained considerable attention recently. In response to this, new privacy protection systems are being introduced. SITDRM is one such system that prote...
Farzad Salim, Nicholas Paul Sheppard, Reihaneh Saf...