Sciweavers

3901 search results - page 700 / 781
» software 2008
Sort
View
92
Voted
CICLING
2008
Springer
15 years 2 months ago
A Probabilistic Model for Guessing Base Forms of New Words by Analogy
Language software applications encounter new words, e.g., acronyms, technical terminology, loan words, names or compounds of such words. Looking at English, one might assume that t...
Krister Lindén
CIKM
2008
Springer
15 years 2 months ago
Handling implicit geographic evidence for geographic ir
Most geographic information retrieval systems depend on the detection and disambiguation of place names in documents, assuming that the documents with a specific geographic scope ...
Nuno Cardoso, Mário J. Silva, Diana Santos
125
Voted
CIKM
2008
Springer
15 years 2 months ago
Purpose tagging: capturing user intent to assist goal-oriented social search
The terms that are used by users during tagging have been found to be different from the terms that are used when searching for resources, which represents a fundamental problem f...
Markus Strohmaier
CCS
2008
ACM
15 years 2 months ago
Mutual authentication in RFID: security and privacy
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model ...
Radu-Ioan Paise, Serge Vaudenay
CCS
2008
ACM
15 years 2 months ago
Efficient and extensible security enforcement using dynamic data flow analysis
Current taint tracking systems suffer from high overhead and a lack of generality. In this paper, we solve both of these issues with an extensible system that is an order of magni...
Walter Chang, Brandon Streiff, Calvin Lin