Sciweavers

24105 search results - page 4564 / 4821
» Models in Information Retrieval
Sort
View
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
15 years 10 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
CSE
2009
IEEE
15 years 10 months ago
First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL
—Social Network Analysis (SNA) has evolved as a popular, standard method for modeling meaningful, often hidden structural relationships in communities. Existing SNA tools often i...
Elizabeth M. Bonsignore, Cody Dunne, Dana Rotman, ...
IROS
2009
IEEE
161views Robotics» more  IROS 2009»
15 years 10 months ago
Accurate shape-based 6-DoF pose estimation of single-colored objects
— The problem of accurate 6-DoF pose estimation of 3D objects based on their shape has so far been solved only for specific object geometries. Edge-based recognition and trackin...
Pedram Azad, Tamim Asfour, Rüdiger Dillmann
145
Voted
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
15 years 10 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...
WAIM
2009
Springer
15 years 10 months ago
Personalized Delivery of On-Line Search Advertisement Based on User Interests
Search engine advertising has become the main stream of online advertising system. In current search engine advertising systems, all users will get the same advertisement rank if t...
Guangyi Xiao, Zhiguo Gong
« Prev « First page 4564 / 4821 Last » Next »