Sciweavers

2421 search results - page 93 / 485
» Message from the Editor-in-Chief
Sort
View
SIGIR
2009
ACM
14 years 4 months ago
It pays to be picky: an evaluation of thread retrieval in online forums
Online forums host a rich information exchange, often with contributions from many subject matter experts. In this work we evaluate algorithms for thread retrieval in a large and ...
Jonathan L. Elsas, Jaime G. Carbonell
SECON
2007
IEEE
14 years 4 months ago
Multi-user Broadcast Authentication in Wireless Sensor Networks
— Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as it allows the mobile users of WSNs to broadcast messages to multiple sensor nodes...
Kui Ren, Wenjing Lou, Yanchao Zhang
HICSS
1996
IEEE
84views Biometrics» more  HICSS 1996»
14 years 2 months ago
The Development of FEDI in Switzerland: A Life-Cycle Approach
Four major Swiss banks have recently introduced a new financial electronic data interchange (FEDI) service based on UN/EDIFACT and are now trying to convince their corporate custo...
Ivo Cathomen, Stefan Klein
CVPR
2009
IEEE
1468views Computer Vision» more  CVPR 2009»
15 years 5 months ago
Hardware-Efficient Belief Propagation
Belief propagation (BP) is an effective algorithm for solving energy minimization problems in computer vision. However, it requires enormous memory, bandwidth, and computation beca...
Chao-Chung Cheng, Chia-Kai Liang, Homer H. Chen, L...
INFOCOM
2009
IEEE
14 years 4 months ago
Capabilities of Low-Power Wireless Jammers
— In this paper, motivated by the goal of modeling the fine-grain capabilities of jammers for the context of security in low-power wireless networks, we experimentally character...
Lifeng Sang, Anish Arora