Sciweavers

1611 search results - page 280 / 323
» Queries Independent of Updates
Sort
View
ACSAC
2006
IEEE
15 years 5 months ago
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks
Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
IDEAS
2006
IEEE
110views Database» more  IDEAS 2006»
15 years 5 months ago
Towards Traceability across Sovereign, Distributed RFID Databases
Tracking and tracing individual items is a new and emerging trend in many industries. Driven by maturing technologies such as Radio-Frequency Identification (RFID) and upcoming s...
Rakesh Agrawal, Alvin Cheung, Karin Kailing, Stefa...
P2P
2005
IEEE
119views Communications» more  P2P 2005»
15 years 5 months ago
Search with Probabilistic Guarantees in Unstructured Peer-to-Peer Networks
Search is a fundamental service in peer-to-peer (P2P) networks. However, despite numerous research efforts, efficient algorithms for guaranteed location of shared content in unst...
Ronaldo A. Ferreira, Murali Krishna Ramanathan, As...
TIME
2005
IEEE
15 years 5 months ago
LOLA: Runtime Monitoring of Synchronous Systems
Abstract— We present a specification language and algorithms for the online and offline monitoring of synchronous systems including circuits and embedded systems. Such monitori...
Ben D'Angelo, Sriram Sankaranarayanan, Césa...
SIGIR
2005
ACM
15 years 5 months ago
Relevance information: a loss of entropy but a gain for IDF?
When investigating alternative estimates for term discriminativeness, we discovered that relevance information and idf are much closer related than formulated in classical literat...
Arjen P. de Vries, Thomas Rölleke