Sciweavers

734 search results - page 132 / 147
» A Question-Answering System Using Argumentation
Sort
View
CCS
2009
ACM
14 years 3 months ago
Attacking cryptographic schemes based on "perturbation polynomials"
We show attacks on several cryptographic schemes that have recently been proposed for achieving various security goals in sensor networks. Roughly speaking, these schemes all use ...
Martin Albrecht, Craig Gentry, Shai Halevi, Jonath...
IWMM
2009
Springer
122views Hardware» more  IWMM 2009»
14 years 3 months ago
Parametric heap usage analysis for functional programs
This paper presents an analysis that derives a formula describing the worst-case live heap space usage of programs in a functional language with automated memory management (garba...
Leena Unnikrishnan, Scott D. Stoller
INFOCOM
2008
IEEE
14 years 2 months ago
Power Awareness in Network Design and Routing
Abstract—Exponential bandwidth scaling has been a fundamental driver of the growth and popularity of the Internet. However, increases in bandwidth have been accompanied by increa...
Joseph Chabarek, Joel Sommers, Paul Barford, Crist...
ICEBE
2007
IEEE
158views Business» more  ICEBE 2007»
14 years 2 months ago
The Design of A Rule-based and Event-driven Trust Management Framework
In both E-Commerce (EC) and Service-Oriented Computing (SOC) environments, sellers or service providers interact with customers or service clients for services or transactions. Fr...
Yan Wang 0002, Duncan S. Wong, Kwei-Jay Lin, Vijay...
ICCS
2007
Springer
14 years 2 months ago
Exploration of TCM Masters Knowledge Mining
Traditional Chinese medicine (TCM) has a rich knowledge about human health and disease by its special way evolved along a very long history. As modern medicine is achieving much pr...
Xijin Tang, Nan Zhang, Zheng Wang