Sciweavers

62 search results - page 6 / 13
» Asymmetric Information in Fads Models
Sort
View
ACSAC
2001
IEEE
13 years 11 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson
ECIR
2009
Springer
14 years 4 months ago
Risk-Aware Information Retrieval
Probabilistic retrieval models usually rank documents based on a scalar quantity. However, such models lack any estimate for the uncertainty associated with a document’s rank. Fu...
Jianhan Zhu, Jun Wang, Michael J. Taylor, Ingemar ...
TIP
2010
164views more  TIP 2010»
13 years 2 months ago
A Marked Point Process for Modeling Lidar Waveforms
Lidar waveforms are 1D signals representing a train of echoes caused by reflections at different targets. Modeling these echoes with the appropriate parametric function is useful ...
Clément Mallet, Florent Lafarge, Michel Rou...
ACNS
2005
Springer
97views Cryptology» more  ACNS 2005»
14 years 1 months ago
Quantifying Security in Hybrid Cellular Networks
Abstract. We propose a micro-payment scheme for symmetric multihop cellular networks that encourages intermediaries to transmit packets and recipients to provide auditing informati...
Markus Jakobsson, Liu Yang
CIKM
2009
Springer
14 years 2 months ago
Text summarization model based on the budgeted median problem
We propose a multi-document generic summarization model based on the budgeted median problem. Our model selects sentences to generate a summary so that every sentence in the docum...
Hiroya Takamura, Manabu Okumura