Unsolicited commercial or bulk emails or emails containing viruses pose a great threat to the utility of email communications. A recent solution for filtering is reputation systems...
Yuchun Tang, Sven Krasser, Dmitri Alperovitch, Pau...
Background: The hierarchical and partially redundant nature of protein structures justifies the definition of frequently occurring conformations of short fragments as `states'...
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. 's LCSS RFID authentication protocol, Song and Mitchell's protocol are...
This short paper describes preliminary ideas for empowering e-learning platform Moodle with rules and semantics. Many existing web applications already contain a lot of structured ...
Sergey Lukichev, Ion-Mircea Diaconescu, Adrian Giu...
In this paper we propose a novel sentence retrieval method based on extracting highly frequent terms from top retrieved documents. We compare it against state of the art sentence r...