Sciweavers

2454 search results - page 318 / 491
» Privacy in the Information and Communications Technologies
Sort
View
148
Voted
IH
2009
Springer
15 years 8 months ago
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
Abstract. A physically unclonable function (PUF) is a multiple-input, multipleoutput, large entropy physical system that is unreproducible due to its structural complexity. A publi...
Nathan Beckmann, Miodrag Potkonjak
SPIRE
2009
Springer
15 years 8 months ago
Two-Dimensional Distributed Inverted Files
Abstract. Term-partitioned indexes are generally inefficient for the evaluation of conjunctive queries, as they require the communication of long posting lists. On the other side, ...
Esteban Feuerstein, Mauricio Marín, Michel ...
130
Voted
CISS
2008
IEEE
15 years 8 months ago
Incorporating retransmission diversity in quality-of-service guaranteed multi-user scheduling
Abstract— A cross-layer optimization combining retransmission diversity with multi-user diversity is investigated for wireless communications. To this end, a joint design of adap...
Xin Wang, Di Wang, Irena Li, Hanqi Zhuang, Salvato...
ICDIM
2007
IEEE
15 years 8 months ago
Optimized contextual discovery of Web Services for Devices
Due to more and more mobile computers moving among smart and communicating devices in our everyday life, we observe the emergence of new constraints in software design. Indeed, de...
Nicolas Bussiere, Daniel Cheung-Foo-Wo, Vincent Ho...
ITNG
2007
IEEE
15 years 8 months ago
Efficient Spam Email Filtering using Adaptive Ontology
Email has become one of the fastest and most economical forms of communication. However, the increase of email users has resulted in the dramatic increase of spam emails during th...
Seongwook Youn, Dennis McLeod