Sciweavers

3481 search results - page 577 / 697
» Exploration in Relational Worlds
Sort
View
COLING
2010
13 years 4 months ago
Plagiarism Detection across Distant Language Pairs
Plagiarism, the unacknowledged reuse of text, does not end at language boundaries. Cross-language plagiarism occurs if a text is translated from a fragment written in a different ...
Alberto Barrón-Cedeño, Paolo Rosso, ...
JCS
2011
91views more  JCS 2011»
13 years 4 months ago
A framework for analyzing RFID distance bounding protocols
Many distance bounding protocols appropriate for the RFID technology have been proposed recently. Unfortunately, they are commonly designed without any formal approach, which lead...
Gildas Avoine, Muhammed Ali Bingöl, Süle...
HOTNETS
2010
13 years 4 months ago
A case for information-bound referencing
Links and content references form the foundation of the way that users interact today. Unfortunately, the links used today (URLs) are fragile since they tightly specify a protocol...
Ashok Anand, Aditya Akella, Vyas Sekar, Srinivasan...
IFIP
2010
Springer
13 years 4 months ago
Are BGP Routers Open to Attack? An Experiment
Abstract. The BGP protocol is at the core of the routing infrastructure of the Internet. Across years, BGP has proved to be very stable for its purpose. However, there have been so...
Ludovico Cavedon, Christopher Kruegel, Giovanni Vi...
ITSE
2010
115views more  ITSE 2010»
13 years 4 months ago
Social navigation in web lectures: a study of virtPresenter
Social Navigation is an emerging approach to enhance online learning content. With social navigation, users can be guided through large volumes of learning material by visual cues...
Robert Mertens, Markus Ketterl, Peter Brusilovsky