Sciweavers

2429 search results - page 254 / 486
» Using Aspects to Design a Secure System
Sort
View
SIGIR
2005
ACM
15 years 9 months ago
Modeling task-genre relationships for IR in the workplace
Context influences the search process, but to date research has not definitively identified which aspects of context are the most influential for information retrieval, and thus a...
Luanne Freund, Elaine G. Toms, Charles L. A. Clark...
SAC
2006
ACM
15 years 9 months ago
Lost in just the translation
This paper describes the design and implementation of a scheme for hiding information in translated natural language text, and presents experimental results using the implemented ...
Ryan Stutsman, Christian Grothoff, Mikhail J. Atal...
109
Voted
ESORICS
2005
Springer
15 years 8 months ago
Sybil-Resistant DHT Routing
Distributed Hash Tables (DHTs) are very efficient distributed systems for routing, but at the same time vulnerable to disruptive nodes. Designers of such systems want them used in ...
George Danezis, Chris Lesniewski-Laas, M. Frans Ka...
EWSA
2005
Springer
15 years 8 months ago
Architecture Description for Mobile Distributed Systems
Abstract. In this paper we motivate an Architecture Description Language (ADL) for mobile distributed systems based on the π-calculus. Different from other approaches, the non-fu...
Volker Gruhn, Clemens Schäfer
103
Voted
HICSS
2007
IEEE
98views Biometrics» more  HICSS 2007»
15 years 9 months ago
Electricity industry restructuring in Australia: underlying principles and experience to date
Electricity restructuring is a complex, never-ending process that has engineering, economic, social, commercial, legal and policy dimensions and takes place within a broad societa...
Hugh Outhred