Sciweavers

4589 search results - page 722 / 918
» A new evaluation measure for information retrieval systems
Sort
View
USENIX
2003
13 years 10 months ago
The Design of the {OpenBSD} Cryptographic Framework
Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator car...
Angelos D. Keromytis, Jason L. Wright, Theo de Raa...
WWW
2008
ACM
14 years 10 months ago
Efficient multi-keyword search over p2p web
Current search mechanisms of DHT-based P2P systems can well handle a single keyword search problem. Other than single keyword search, multi-keyword search is quite popular and use...
Hanhua Chen, Hai Jin, Jiliang Wang, Lei Chen 0002,...
MOBISYS
2007
ACM
14 years 9 months ago
Radio interferometric tracking of mobile wireless nodes
Location-awareness is an important requirement for many mobile wireless applications today. When GPS is not applicable because of the required precision and/or the resource constr...
Branislav Kusy, János Sallai, György B...
GLOBECOM
2007
IEEE
14 years 3 months ago
Sensing Workload Scheduling in Sensor Networks Using Divisible Load Theory
Abstract— This paper presents scheduling strategies for sensing workload in wireless sensor networks using Divisible Load Theory (DLT), which offers a tractable model and realist...
Xiaolin Li, Xinxin Liu, Hui Kang
METRICS
2002
IEEE
14 years 2 months ago
A Generic Model and Tool Support for Assessing and Improving Web Processes
Process assessment or process improvement is usually not considered in the context of Web applications, and the differences between Web applications and traditional applications a...
Daniel Rodríguez, Rachel Harrison, Manoranj...