Sciweavers

2702 search results - page 418 / 541
» Message from the Editor
Sort
View
105
Voted
CEAS
2005
Springer
15 years 9 months ago
Implicit Queries for Email
Implicit query systems examine a document and automatically conduct searches for the most relevant information. In this paper, we offer three contributions to implicit query resea...
Joshua Goodman, Vitor R. Carvalho
100
Voted
CEAS
2005
Springer
15 years 9 months ago
Accredited DomainKeys: A Service Architecture for Improved Email Validation
We present an architecture called Accredited DomainKeys, which builds on the DomainKeys email authentication infrastructure to address the following questions: • “Did the send...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
154
Voted
FASE
2005
Springer
15 years 9 months ago
Coverage Criteria for Testing of Object Interactions in Sequence Diagrams
This work defines several control-flow coverage criteria for testing the interactions among a set of collaborating objects. The criteria are based on UML sequence diagrams that a...
Atanas Rountev, Scott Kagan, Jason Sawin
138
Voted
GCC
2005
Springer
15 years 9 months ago
A Topology Adaptation Protocol for Structured Superpeer Overlay Construction
Peer-to-peer networks can be divided into structured and unstructured based on their overlay topologies. In reality, unstructured p2p networks with superpeers have proved their cap...
Changyong Niu, Jian Wang, Ruimin Shen
145
Voted
ISPEC
2005
Springer
15 years 9 months ago
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes
A (t, n) threshold proxy signature scheme enables an original signer to delegate the signature authority to a proxy group of n member such that t or more than t proxy signers can ...
Zuowen Tan, Zhuojun Liu, Wang Mingsheng