Sciweavers

4911 search results - page 697 / 983
» Tree dependence analysis
Sort
View
RFIDSEC
2010
15 years 2 months ago
The Poulidor Distance-Bounding Protocol
RFID authentication protocols are susceptible to different types of relay attacks such as mafia and distance frauds. A countermeasure against these types of attacks are the well-...
Rolando Trujillo-Rasua, Benjamin Martin 0002, Gild...
CIKM
2010
Springer
15 years 1 months ago
Utilizing re-finding for personalized information retrieval
Individuals often use search engines to return to web pages they have previously visited. This behaviour, called refinding, accounts for about 38% of all queries. While researcher...
Sarah K. Tyler, Jian Wang, Yi Zhang 0001
CIKM
2010
Springer
15 years 1 months ago
Index structures for efficiently searching natural language text
Many existing indexes on text work at the document granularity and are not effective in answering the class of queries where the desired answer is only a term or a phrase. In this...
Pirooz Chubak, Davood Rafiei
FPL
2010
Springer
134views Hardware» more  FPL 2010»
15 years 1 months ago
GPU Versus FPGA for High Productivity Computing
Heterogeneous or co-processor architectures are becoming an important component of high productivity computing systems (HPCS). In this work the performance of a GPU based HPCS is c...
David Huw Jones, Adam Powell, Christos-Savvas Boug...
ISAAC
2010
Springer
226views Algorithms» more  ISAAC 2010»
15 years 1 months ago
On Tractable Cases of Target Set Selection
We study the NP-complete TARGET SET SELECTION (TSS) problem occurring in social network analysis. Complementing results on its approximability and extending results for its restric...
André Nichterlein, Rolf Niedermeier, Johann...