Sciweavers

511 search results - page 28 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
NDSS
2002
IEEE
15 years 8 months ago
Talking to Strangers: Authentication in Ad-Hoc Wireless Networks
In this paper we address the problem of secure communication and authentication in ad-hoc wireless networks. This is a difficult problem, as it involves bootstrapping trust betwe...
Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. ...
153
Voted
CLEF
2008
Springer
15 years 5 months ago
Cross Language Experiments at Persian@CLEF 2008
In this study we will discuss our cross language text retrieval (CLIR) experiments of Persian ad hoc track at CLEF 2008. Two teams from University of Tehran were involved in cross...
Abolfazl AleAhmad, Ehsan Kamalloo, Arash Zareh, Ma...
163
Voted
MM
2010
ACM
243views Multimedia» more  MM 2010»
15 years 4 months ago
Mobile product recognition
We present a mobile product recognition system for the camera-phone. By snapping a picture of a product with a camera-phone, the user can retrieve online information of the produc...
Sam S. Tsai, David M. Chen, Vijay Chandrasekhar, G...
ITCC
2005
IEEE
15 years 9 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...
CLEF
2006
Springer
15 years 7 months ago
SINAI at CLEF 2006 Ad Hoc Robust Multilingual Track: Query Expansion Using the Google Search Engine
This year, we have participated on Ad-Hoc Robust Multilingual track with the aim to evaluate two issues of CLIR systems. Firstly, this paper describes the method followed for quer...
Fernando Martínez Santiago, Arturo Montejo ...