Sciweavers

890 search results - page 105 / 178
» Comparative expert reviews
Sort
View
TCOS
2010
13 years 4 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
OSDI
2008
ACM
14 years 10 months ago
Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions
Abstract ? Large enterprise networks consist of thousands of services and applications. The performance and reliability of any particular application may depend on multiple service...
Xu Chen, Ming Zhang, Zhuoqing Morley Mao, Paramvir...
WSDM
2009
ACM
140views Data Mining» more  WSDM 2009»
14 years 4 months ago
Effective latent space graph-based re-ranking model with global consistency
Recently the re-ranking algorithms have been quite popular for web search and data mining. However, one of the issues is that those algorithms treat the content and link informati...
Hongbo Deng, Michael R. Lyu, Irwin King
BIRTHDAY
2003
Springer
14 years 3 months ago
On the Pagination of Complex Documents
The pagination problem of complex documents is in placing text and floating objects on pages in such a way that each object appears close to, but not before, its text reference. ...
Anne Brüggemann-Klein, Rolf Klein, Stefan Woh...
CAISE
2001
Springer
14 years 2 months ago
Relaxed Soundness of Business Processes
Business processes play a central role in the reorganization of a company and the (re)design of the respective information system(s). Typically the processes are described with the...
Juliane Dehnert, Peter Rittgen