Sciweavers

5410 search results - page 960 / 1082
» When to Cross Over
Sort
View
85
Voted
BIRTHDAY
2005
Springer
15 years 6 months ago
Still
Keywords Name of the disease and synonyms Definition/Diagnostic criteria Juvenile form Comments on the differential diagnosis Incidence Clinical description Method of biological d...
Alice ter Meulen
CCS
2005
ACM
15 years 6 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
110
Voted
CIKM
2005
Springer
15 years 6 months ago
Automatic construction of multifaceted browsing interfaces
Databases of text and text-annotated data constitute a significant fraction of the information available in electronic form. Searching and browsing are the typical ways that users...
Wisam Dakka, Panagiotis G. Ipeirotis, Kenneth R. W...
98
Voted
CIKM
2005
Springer
15 years 6 months ago
Structured queries in XML retrieval
Document-centric XML is a mixture of text and structure. With the increased availability of document-centric XML content comes a need for query facilities in which both structural...
Jaap Kamps, Maarten Marx, Maarten de Rijke, Bö...
145
Voted
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
15 years 6 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay