Sciweavers

1456 search results - page 279 / 292
» Keeping encountered information
Sort
View
ATAL
2008
Springer
14 years 12 days ago
Content-oriented composite service negotiation with complex preferences
In e-commerce, for some cases the service requested by the consumer cannot be fulfilled by the producer. In such cases, service consumers and producers need to negotiate their ser...
Reyhan Aydogan
CCS
2008
ACM
14 years 12 days ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
ESORICS
2008
Springer
14 years 5 days ago
Remote Integrity Check with Dishonest Storage Server
We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server,...
Ee-Chien Chang, Jia Xu
LREC
2010
173views Education» more  LREC 2010»
13 years 12 months ago
LIMA : A Multilingual Framework for Linguistic Analysis and Linguistic Resources Development and Evaluation
The increasing amount of available textual information makes necessary the use of Natural Language Processing (NLP) tools. These tools have to be used on large collections of docu...
Romaric Besançon, Gaël de Chalendar, O...
NSDI
2010
13 years 12 months ago
Glasnost: Enabling End Users to Detect Traffic Differentiation
Holding residential ISPs to their contractual or legal obligations of "unlimited service" or "network neutrality" is hard because their traffic management poli...
Marcel Dischinger, Massimiliano Marcon, Saikat Guh...