Sciweavers

2120 search results - page 373 / 424
» Management and Sharing of Bibliographies
Sort
View
MSWIM
2009
ACM
15 years 4 months ago
Modeling and performance evaluation of transmission control protocol over cognitive radio ad hoc networks
Cognitive Radio (CR) technology constitutes a new paradigm to provide additional spectrum utilization opportunities in wireless ad hoc networks. Recent research in this field has ...
Marco Di Felice, Kaushik Roy Chowdhury, Luciano Bo...
ECAI
2000
Springer
15 years 4 months ago
Flexible Text Classification for Financial Applications: The Facile System
This paper describes an advanced system for multilingual text classification adaptable to different user needs. The system has been initially developed as an applied research proje...
Fabio Ciravegna, Alberto Lavelli, Nadia Mana, Joha...
USENIX
2008
15 years 2 months ago
Protection Strategies for Direct Access to Virtualized I/O Devices
Commodity virtual machine monitors forbid direct access to I/O devices by untrusted guest operating systems in order to provide protection and sharing. However, both I/O memory ma...
Paul Willmann, Scott Rixner, Alan L. Cox
CCS
2008
ACM
15 years 1 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig
EUROISI
2008
15 years 1 months ago
Homeland Security Data Mining Using Social Network Analysis
The tragic events of September 11th have caused drastic effects on many aspects of society. Academics in the fields of computational and information science have been called upon ...
Hsinchun Chen