Sciweavers

4987 search results - page 278 / 998
» Support Ordered Resolution
Sort
View
146
Voted
CCS
2007
ACM
15 years 10 months ago
Detecting relay attacks with timing-based protocols
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bou...
Jason Reid, Juan Manuel González Nieto, Tee...
SAC
2006
ACM
15 years 10 months ago
Detecting identifiable areas in mobile environments
Location-based applications and services are getting increasingly important for mobile users. They take into account a mobile user's current location and provide a location-d...
Jörg Roth
153
Voted
CICLING
2005
Springer
15 years 10 months ago
Two Web-Based Approaches for Noun Sense Disambiguation
The problem of the resolution of the lexical ambiguity, which is commonly referred as Word Sense Disambiguation (WSD), seems to be stuck because of the knowledge acquisition bottle...
Paolo Rosso, Manuel Montes-y-Gómez, Davide ...
165
Voted
DBISP2P
2005
Springer
129views Database» more  DBISP2P 2005»
15 years 10 months ago
Querying a Super-Peer in a Schema-Based Super-Peer Network
We propose a novel approach for de ning and querying a super-peer within a schema-based super-peer network organized into a two-level architecture: the low level, called the peer l...
Domenico Beneventano, Sonia Bergamaschi, Francesco...
EGPGV
2004
Springer
147views Visualization» more  EGPGV 2004»
15 years 10 months ago
I/O Strategies for Parallel Rendering of Large Time-Varying Volume Data
This paper presents I/O solutions for the visualization of time-varying volume data in a parallel and distributed computing environment. Depending on the number of rendering proce...
Hongfeng Yu, Kwan-Liu Ma, Joel Welling