Sciweavers

24529 search results - page 4790 / 4906
» Computing on Authenticated Data
Sort
View
131
Voted
CIKM
2005
Springer
15 years 8 months ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...
CIKM
2005
Springer
15 years 8 months ago
Maximal termsets as a query structuring mechanism
Search engines process queries conjunctively to restrict the size of the answer set. Further, it is not rare to observe a mismatch between the vocabulary used in the text of Web p...
Bruno Pôssas, Nivio Ziviani, Berthier A. Rib...
144
Voted
DCOSS
2005
Springer
15 years 8 months ago
jWebDust : A Java-Based Generic Application Environment for Wireless Sensor Networks
Abstract. Wireless sensor networks can be very useful in applications that require the detection of crucial events, in physical environments subjected to critical conditions, and t...
Ioannis Chatzigiannakis, Georgios Mylonas, Sotiris...
EUC
2005
Springer
15 years 8 months ago
Coverage-Aware Sensor Engagement in Dense Sensor Networks
Wireless sensor networks are capable of carrying out surveillance missions for various applications in remote areas without human interventions. An essential issue of sensor netwo...
Jun Lu, Lichun Bao, Tatsuya Suda
GECCO
2005
Springer
159views Optimization» more  GECCO 2005»
15 years 8 months ago
Using evolutionary algorithms for the unit testing of object-oriented software
As the paradigm of object orientation becomes more and more important for modern IT development projects, the demand for an automated test case generation to dynamically test obje...
Stefan Wappler, Frank Lammermann
« Prev « First page 4790 / 4906 Last » Next »