Sciweavers

860 search results - page 124 / 172
» Natural selection of academic papers
Sort
View
86
Voted
APNOMS
2006
Springer
15 years 1 months ago
Information-Driven Task Routing for Network Management in Wireless Sensor Networks
Wireless sensor networks (WSNs) consist of a large collection of small nodes providing collaborative and distributed sensing ability in unpredictable environments. Given their unat...
Yu Liu, Yumei Wang, Lin Zhang, Chan-Hyun Youn
CCS
2006
ACM
15 years 1 months ago
Searchable symmetric encryption: improved definitions and efficient constructions
Searchable symmetric encryption (SSE) allows a party to outsource the storage of his data to another party in a private manner, while maintaining the ability to selectively search...
Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail ...
78
Voted
CLEF
2006
Springer
15 years 1 months ago
A High Precision Information Retrieval Method for WiQA
This paper presents Wolverhampton University's participation in the WiQA competition. The method chosen for this task combines a high precision, but low recall information re...
Constantin Orasan, Georgiana Puscasu
77
Voted
EWCBR
2006
Springer
15 years 1 months ago
Combining Multiple Similarity Metrics Using a Multicriteria Approach
The design of a CBR system involves the use of similarity metrics. For many applications, various functions can be adopted to compare case features and to aggregate them into a glo...
Luc Lamontagne, Irène Abi-Zeid
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
15 years 1 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio