Sciweavers

1166 search results - page 124 / 234
» Question Answering Using a Large NLP System
Sort
View
PAM
2007
Springer
15 years 9 months ago
Packet Capture in 10-Gigabit Ethernet Environments Using Contemporary Commodity Hardware
Abstract. Tracing traffic using commodity hardware in contemporary highspeed access or aggregation networks such as 10-Gigabit Ethernet is an increasingly common yet challenging t...
Fabian Schneider, Jörg Wallerich, Anja Feldma...
PKC
2005
Springer
167views Cryptology» more  PKC 2005»
15 years 8 months ago
Converse Results to the Wiener Attack on RSA
A well-known attack on RSA with low secret-exponent d was given by Wiener about 15 years ago. Wiener showed that using continued fractions, one can efficiently recover the secret-...
Ron Steinfeld, Scott Contini, Huaxiong Wang, Josef...
152
Voted
W2GIS
2009
Springer
15 years 9 months ago
Database and Representation Issues in Geographic Information Systems (GIS)
Abstract. A review is provided of some database and representation issues involved in the implementation of geographic information systems (GIS). The increasing popularity of web-b...
Hanan Samet
DIM
2008
ACM
15 years 5 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel
KES
2004
Springer
15 years 8 months ago
Representing Knowledge in Controlled Natural Language: A Case Study
In this case study I argue for the usage of a machine-oriented controlled natural language as interface language to knowledge systems. Instead of using formal languages that are di...
Rolf Schwitter