Sciweavers

14783 search results - page 2666 / 2957
» Quantum Information Processing
Sort
View
136
Voted
CCS
2001
ACM
15 years 9 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
WIA
2001
Springer
15 years 8 months ago
Finite-State Transducer Cascade to Extract Proper Names in Texts
This article describes a finite-state cascade for the extraction of person names in texts in French. We extract these proper names in order to categorize and to cluster texts with...
Nathalie Friburger, Denis Maurel
ICC
2000
IEEE
137views Communications» more  ICC 2000»
15 years 8 months ago
Internet QoS Routing with IP Telephony and TCP Traffic
— In this paper, we propose the use of QoS routing to enhance the support of IP Telephony. Our proposed scheme is based on QoS intradomain OSPF routing, an extension of the conve...
Alex Dubrovsky, Mario Gerla, Scott Seongwook Lee, ...
CPM
2000
Springer
177views Combinatorics» more  CPM 2000»
15 years 8 months ago
Identifying and Filtering Near-Duplicate Documents
Abstract. The mathematical concept of document resemblance captures well the informal notion of syntactic similarity. The resemblance can be estimated using a fixed size “sketch...
Andrei Z. Broder
ECBS
1999
IEEE
171views Hardware» more  ECBS 1999»
15 years 8 months ago
Metamodeling - Rapid Design and Evolution of Domain-Specific Modeling Environments
Model integrated computing (MIC) is gaining increased attention as an effective and efficient method for developing, maintaining, and evolving large-scale, domain-specific softwar...
Greg Nordstrom, Janos Sztipanovits, Gabor Karsai, ...
« Prev « First page 2666 / 2957 Last » Next »