Sciweavers

158 search results - page 4 / 32
» Conference Keynote Address
Sort
View
CIC
2006
114views Communications» more  CIC 2006»
13 years 9 months ago
Tree Based Conference Key Establishment Cost Analysis and Minimization in Heterogeneous Networks
A shared secret, conference key, must be established among members to securely communicate among them. The Diffie-Hellman is often used for the conference key establishment. In a ...
Zhan Liu, Mi Lu
SIGIR
2008
ACM
13 years 7 months ago
Information access to cultural heritage
The workshop on Information Access to Cultural Heritage (IACH 2008) was held during the ECDL conference in Aarhus on the 18th September 2008. The workshop provided a venue to brin...
Martha Larson, Kate Fernie, Johan Oomen, Juan Migu...
ACSC
2009
IEEE
14 years 2 months ago
A Citation Analysis of the ACSC 2006-2008 Proceedings, with Reference to the CORE Conference and Journal Rankings
1 This paper compares the CORE rankings of computing conferences and journals to the frequency of citation of those journals and conferences in the Australasian Computer Science Co...
Raymond Lister, Ilona Box
CAS
2004
104views more  CAS 2004»
13 years 7 months ago
Why Model?
This lecture treats some enduring misconceptions about modeling. One of these is that the goal is always prediction. The lecture distinguishes between explanation and prediction a...
S. E. van der Leeuw
CHI
2005
ACM
14 years 8 months ago
Understanding research trends in conferences using paperLens
PaperLens is a novel visualization that reveals trends, connections, and activity throughout a conference community. It tightly couples views across papers, authors, and reference...
Bongshin Lee, Mary Czerwinski, George G. Robertson...