Sciweavers

1960 search results - page 326 / 392
» A Hidden Markov Model Information Retrieval System
Sort
View
CCS
2005
ACM
15 years 10 months ago
Formal security analysis of basic network-attached storage
We study formal security properties of network-attached storage (NAS) in an applied pi calculus. We model NAS as an implementation of a specification based on traditional central...
Avik Chaudhuri, Martín Abadi
HT
2007
ACM
15 years 8 months ago
Annotation consensus: implications for passage recommendation in scientific literature
We present a study of the degree to which annotations overlap when several researchers read the same set of scientific articles. Our objective is to determine whether there is suf...
Shannon Bradshaw, Marc Light
IH
2005
Springer
15 years 10 months ago
Censorship Resistance Revisited
Abstract. “Censorship resistant” systems attempt to prevent censors from imposing a particular distribution of content across a system. In this paper, we introduce a variation ...
Ginger Perng, Michael K. Reiter, Chenxi Wang
150
Voted
ATAL
2010
Springer
15 years 5 months ago
Augmenting appearance-based localization and navigation using belief update
Appearance-based localization compares the current image taken from a robot's camera to a set of pre-recorded images in order to estimate the current location of the robot. S...
George Chrysanthakopoulos, Guy Shani
JSAC
2007
130views more  JSAC 2007»
15 years 4 months ago
Cross-layer QoS Analysis of Opportunistic OFDM-TDMA and OFDMA Networks
Abstract— Performance analysis of multiuser orthogonal frequency division multiplexing (OFDM-TDMA) and orthogonal frequency division multiple access (OFDMA) networks in support o...
Yu-Jung Chang, Feng-Tsun Chien, C. C. Jay Kuo