Sciweavers

8972 search results - page 1632 / 1795
» Private Information Retrieval
Sort
View
AIRWEB
2008
Springer
15 years 1 months ago
Identifying web spam with user behavior analysis
Combating Web spam has become one of the top challenges for Web search engines. State-of-the-art spam detection techniques are usually designed for specific known types of Web spa...
Yiqun Liu, Rongwei Cen, Min Zhang, Shaoping Ma, Li...
ISQED
2010
IEEE
156views Hardware» more  ISQED 2010»
15 years 1 months ago
On the design of different concurrent EDC schemes for S-Box and GF(p)
Recent studies have shown that an attacker can retrieve confidential information from cryptographic hardware (e.g. the secret key) by introducing internal faults. A secure and re...
Jimson Mathew, Hafizur Rahaman, Abusaleh M. Jabir,...
ASWC
2006
Springer
15 years 1 months ago
A Semantic Search Conceptual Model and Application in Security Access Control
Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
Kunmei Wen, Zhengding Lu, Ruixuan Li, Xiaolin Sun,...
HT
2010
ACM
15 years 1 months ago
Assessing users' interactions for clustering web documents: a pragmatic approach
In this paper we are interested in describing Web pages by how users interact within their contents. Thus, an alternate but complementary way of labelling and classifying Web docu...
Luis A. Leiva, Enrique Vidal
DEXA
2005
Springer
111views Database» more  DEXA 2005»
15 years 1 months ago
On the General Signature Trees
The signature file method is a popular indexing technique used in information retrieval and databases. It excels in efficient index maintenance and lower space overhead. Different ...
Yangjun Chen
« Prev « First page 1632 / 1795 Last » Next »