Sciweavers

5863 search results - page 28 / 1173
» An evaluation of the TRIPS computer system
Sort
View
PEWASUN
2005
ACM
14 years 2 months ago
Characterizing and modeling user mobility in a cellular data network
The demand for cellular data networks is expected to increase with 3G and beyond technologies accompanied by highbandwidth consumer services, such as wireless video and camera pho...
Emir Halepovic, Carey L. Williamson
ICISC
2008
123views Cryptology» more  ICISC 2008»
13 years 10 months ago
The Swiss-Knife RFID Distance Bounding Protocol
Relay attacks are one of the most challenging threats RFID will have to face in the close future. They consist in making the verifier believe that the prover is in its close vicini...
Chong Hee Kim, Gildas Avoine, François Koeu...
ACL
2012
11 years 11 months ago
Combining Coherence Models and Machine Translation Evaluation Metrics for Summarization Evaluation
An ideal summarization system should produce summaries that have high content coverage and linguistic quality. Many state-ofthe-art summarization systems focus on content coverage...
Ziheng Lin, Chang Liu, Hwee Tou Ng, Min-Yen Kan