Sciweavers

25538 search results - page 5064 / 5108
» Explanation in Information Systems
Sort
View
ISI
2006
Springer
13 years 10 months ago
Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading
An intelligence analyst often needs to keep track of more facts than can be held in human memory. As a result, analysts use a notebook or evidence file to record facts learned so f...
Eric A. Bier, Edward W. Ishak, Ed Chi
JSAC
2008
90views more  JSAC 2008»
13 years 10 months ago
Limited feedback schemes for downlink OFDMA based on sub-channel groups
Abstract--In a downlink Orthogonal Frequency Division Multiple Access (OFDMA) system, optimally allocating sub-channels across mobile users can require excessive feedback of channe...
Jieying Chen, Randall A. Berry, Michael L. Honig
DEBU
2007
142views more  DEBU 2007»
13 years 10 months ago
Multi-lingual Indexing Support for CLIR using Language Modeling
An indexing model is the heart of an Information Retrieval (IR) system. Data structures such as term based inverted indices have proved to be very effective for IR using vector sp...
Prasad Pingali, Vasudeva Varma
JUCS
2008
156views more  JUCS 2008»
13 years 10 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
JUCS
2008
113views more  JUCS 2008»
13 years 10 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
« Prev « First page 5064 / 5108 Last » Next »