Sciweavers

511 search results - page 24 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
144
Voted
ENTCS
2008
136views more  ENTCS 2008»
15 years 3 months ago
A Virtual Machine Based Information Flow Control System for Policy Enforcement
The ability to enforce usage policies attached to data in a fine grained manner requires that the system be able to trace and control the flow of information within it. This paper...
Srijith Krishnan Nair, Patrick N. D. Simpson, Brun...
RIAO
2007
15 years 5 months ago
Using a Content-and-Structure Oriented Method for Relevance Feedback in XML Retrieval
As opposed to traditional Information Retrieval (IR) which views whole documents as atomic units of retrieval, XML IR processes XML elements as possible units of retrieval. Many o...
Lobna Hlaoua, Mohand Boughanem, Karen Pinel-Sauvag...
INEX
2009
Springer
15 years 8 months ago
Analysis of the INEX 2009 Ad Hoc Track Results
This paper analyzes the results of the INEX 2009 Ad Hoc Track, focusing on a variety of topics. First, we examine in detail the relevance judgments. Second, we study the resulting ...
Jaap Kamps, Shlomo Geva, Andrew Trotman
128
Voted
WWW
2008
ACM
16 years 4 months ago
Performance of compressed inverted list caching in search engines
Due to the rapid growth in the size of the web, web search engines are facing enormous performance challenges. The larger engines in particular have to be able to process tens of ...
Jiangong Zhang, Xiaohui Long, Torsten Suel
140
Voted
ASIACRYPT
2000
Springer
15 years 8 months ago
Security of Signed ElGamal Encryption
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against ...
Claus-Peter Schnorr, Markus Jakobsson