Sciweavers

10289 search results - page 2010 / 2058
» Standard bases in K
Sort
View
AAAI
1996
15 years 3 months ago
Closed Terminologies in Description Logics
We introduce a predictive concept recognition methodology for description logics based on a new closed terminology assumption. During knowledge engineering, our system adopts the ...
Robert A. Weida
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
15 years 3 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
CLEF
2009
Springer
15 years 3 months ago
Prior Art Retrieval Using the Claims Section as a Bag of Words
We describe our participation in the 2009 CLEF-IP task, which was targeted at priorart search for topic patent documents. Our system retrieved patent documents based on a standard...
Suzan Verberne, Eva D'hondt
CONEXT
2009
ACM
15 years 3 months ago
Online optimization of 802.11 mesh networks
802.11 wireless mesh networks are ubiquitous, but suffer from severe performance degradations due to poor synergy between the 802.11 CSMA MAC protocol and higher layers. Several s...
Theodoros Salonidis, Georgios Sotiropoulos, Roch G...
ESORICS
2010
Springer
15 years 3 months ago
Web Browser History Detection as a Real-World Privacy Threat
Web browser history detection using CSS visited styles has long been dismissed as an issue of marginal impact. However, due to recent changes in Web usage patterns, coupled with br...
Artur Janc, Lukasz Olejnik
« Prev « First page 2010 / 2058 Last » Next »