Sciweavers

2702 search results - page 316 / 541
» Message from the Editor
Sort
View
DGO
2008
128views Education» more  DGO 2008»
15 years 5 months ago
Ontology generation for large email collections
This paper presents a new approach to identifying concepts expressed in a collection of email messages, and organizing them into an ontology or taxonomy for browsing. It incorpora...
Hui Yang, Jamie Callan
ECSCW
2007
15 years 5 months ago
Bringing Round-Robin Signature to Computer-Mediated Communication
In computer-mediated group communication, anonymity enables participants to post controversial comments without risking accusations of improper behavior. While this may encourage m...
Takeshi Nishida, Takeo Igarashi
IC
2008
15 years 5 months ago
Generating Web Monitors
- A web monitor is a program used to monitor some public HTML-based Internet information available from dynamic HTML documents on the Internet based on a user defined set of criter...
Nader Mohamed, Ahlam Romaithi, Eiman Samahi, Maith...
ICISC
2007
152views Cryptology» more  ICISC 2007»
15 years 5 months ago
Analysis of Multivariate Hash Functions
We analyse the security of new hash functions whose compression function is explicitly defined as a sequence of multivariate equations. First we prove non-universality of certain ...
Jean-Philippe Aumasson, Willi Meier
MASCOTS
2008
15 years 5 months ago
Taxis: Scalable Strong Anonymous Communication
Anonymity protocols are a privacy-enhancing technology for Internet-based communication. Two important characteristics of anonymity protocols are the strength of anonymity provide...
Andreas Hirt, Michael J. Jacobson Jr., Carey L. Wi...