Sciweavers

2001 search results - page 27 / 401
» An Update on Generalized Information Theory
Sort
View
ICCS
2009
Springer
14 years 2 months ago
System Consequence
My paper discusses system consequence, which is a central idea in the project to lift the theory of information flow to the general level of universal logic and the theory of ins...
Robert E. Kent
ACSAC
2004
IEEE
13 years 11 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
CIKM
2008
Springer
13 years 8 months ago
Protecting location privacy against location-dependent attack in mobile services
Privacy preservation has recently received considerable attention for location-based mobile services. In this paper, we present location-dependent attack resulting from continuous...
Xiao Pan, Jianliang Xu, Xiaofeng Meng
CIKM
2008
Springer
13 years 9 months ago
Generalized inverse document frequency
Inverse document frequency (IDF) is one of the most useful and widely used concepts in information retrieval. There have been various attempts to provide theoretical justification...
Donald Metzler
CIKM
2008
Springer
13 years 9 months ago
An extended cooperative transaction model for xml
In many application areas, for example in design or media production processes, several authors have to work cooperatively on the same project. Thereby, a frequently used data for...
Francis Gropengießer, Kai-Uwe Sattler