Sciweavers

330 search results - page 14 / 66
» Random Indexing Revisited
Sort
View
90
Voted
WWW
2001
ACM
16 years 28 days ago
Placing search in context: the concept revisited
We describe a new paradigm for performing search in context. In the IntelliZap system we developed, search is initiated from a text query marked by the user in a document she view...
Lev Finkelstein, Evgeniy Gabrilovich, Yossi Matias...
RECOMB
2003
Springer
16 years 17 days ago
Transforming men into mice: the Nadeau-Taylor chromosomal breakage model revisited
Although analysis of genome rearrangements was pioneered by Dobzhansky and Sturtevant 65 years ago, we still know very little about the rearrangement events that produced the exis...
Pavel A. Pevzner, Glenn Tesler
102
Voted
ASIACRYPT
2009
Springer
15 years 6 months ago
Cascade Encryption Revisited
Abstract. The security of cascade blockcipher encryption is an important and well-studied problem in theoretical cryptography with practical implications. It is well-known that dou...
Peter Gazi, Ueli M. Maurer
INFOCOM
2007
IEEE
15 years 6 months ago
Broadcast Flooding Revisited: Survivability and Latency
—This paper addresses the dynamics of broadcast flooding in random wireless ad hoc networks. In particular, we study the subset of nodes covered by a flood as well as timing is...
Petteri Mannersalo, Alireza Keshavarz-Haddad, Rudo...
CISC
2007
Springer
152views Cryptology» more  CISC 2007»
15 years 6 months ago
Orthogonality between Key Privacy and Data Privacy, Revisited
Abstract. Key privacy is a notion regarding the privacy of the owner of a public key, which has important applications in building (receiver) anonymous channels, or privacy-enhance...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai