Sciweavers

17 search results - page 2 / 4
» informaticasi 2010
Sort
View
103
Voted
INFORMATICASI
2010
14 years 9 months ago
Cryptanalysis of a Simple Three-party Key Exchange Protocol
Debiao He, Jianhua Chen, Jin Hu
INFORMATICASI
2010
14 years 9 months ago
Context-based Global Expertise in Recommendation Systems
Vincenza Carchiolo, Vincenza Longheu, Michele Malg...
61
Voted
INFORMATICASI
2010
14 years 9 months ago
A Framework for Evaluating Deployed Security Systems: Is There a Chink in your ARMOR?
Matthew E. Taylor, Christopher Kiekintveld, Craig ...
78
Voted
INFORMATICASI
2010
14 years 9 months ago
Using Bagging and Boosting Techniques for Improving Coreference Resolution
Smita Vemulapalli, Xiaoqiang Luo, John F. Pitrelli...
78
Voted
INFORMATICASI
2010
14 years 9 months ago
Using Meta-Structures in Database Design
Hui Ma, René Noack, Klaus-Dieter Schewe, Be...