Sciweavers

511 search results - page 15 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
135
Voted
STORAGESS
2005
ACM
15 years 9 months ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
114
Voted
SIGIR
2006
ACM
15 years 9 months ago
Statistical precision of information retrieval evaluation
We introduce and validate bootstrap techniques to compute confidence intervals that quantify the effect of test-collection variability on average precision (AP) and mean average...
Gordon V. Cormack, Thomas R. Lynam
155
Voted
PEWASUN
2004
ACM
15 years 9 months ago
A framework of secure location service for position-based ad hoc routing
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location i...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
140
Voted
ADHOC
2007
133views more  ADHOC 2007»
15 years 3 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
121
Voted
TREC
1993
15 years 5 months ago
Retrieval of Partial Documents
Management and retrieval of large volumes of text can be expensive in both space and time. Moreover, the range of document sizes in a large collection such as trec presents difficu...
Alistair Moffat, Ron Sacks-Davis, Ross Wilkinson, ...