Sciweavers

511 search results - page 51 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
16 years 4 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
120
Voted
ACSAC
2005
IEEE
15 years 9 months ago
Strengthening Software Self-Checksumming via Self-Modifying Code
Recent research has proposed self-checksumming as a method by which a program can detect any possibly malicious modification to its code. Wurster et al. developed an attack again...
Jonathon T. Giffin, Mihai Christodorescu, Louis Kr...
CIKM
2008
Springer
15 years 5 months ago
Cost-effective spam detection in p2p file-sharing systems
Spam is highly pervasive in P2P file-sharing systems and is difficult to detect automatically before actually downloading a file due to the insufficient and biased description of ...
Dongmei Jia
RIAO
2000
15 years 5 months ago
Allowing users to weight search terms
Informationretrieval systems typically weight the importance of search terms according to document and collection statistics (such as by using tf idf scores, where less commonterm...
Ronald Fagin, Yoëlle S. Maarek
IPM
2007
99views more  IPM 2007»
15 years 3 months ago
Percent perfect performance (PPP)
An information retrieval performance measure that is interpreted as the percent of perfect performance (PPP) can be used to study the effects of the inclusion of specific documen...
Robert M. Losee