Sciweavers

4965 search results - page 861 / 993
» Measuring the Performance of Real-Time Systems
Sort
View
CANS
2009
Springer
180views Cryptology» more  CANS 2009»
15 years 11 months ago
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
Chong Hee Kim, Gildas Avoine
ATAL
2009
Springer
15 years 11 months ago
Genius: negotiation environment for heterogeneous agents
In this demo, we present GENIUS, a tool that facilitates research in the area of bilateral multi-issue negotiation. It implements an open architecture allowing easy development an...
Koen V. Hindriks, Catholijn M. Jonker, Sarit Kraus...
CIKM
2009
Springer
15 years 11 months ago
Translating relevance scores to probabilities for contextual advertising
Information retrieval systems conventionally assess document relevance using the bag of words model. Consequently, relevance scores of documents retrieved for different queries a...
Deepak Agarwal, Evgeniy Gabrilovich, Robert Hall, ...
CIKM
2009
Springer
15 years 11 months ago
Expected reciprocal rank for graded relevance
While numerous metrics for information retrieval are available in the case of binary relevance, there is only one commonly used metric for graded relevance, namely the Discounted ...
Olivier Chapelle, Donald Metlzer, Ya Zhang, Pierre...
CIKM
2009
Springer
15 years 11 months ago
Cross-language linking of news stories on the web using interlingual topic modelling
We have studied the problem of linking event information across different languages without the use of translation systems or dictionaries. The linking is based on interlingua in...
Wim De Smet, Marie-Francine Moens