Sciweavers

24105 search results - page 4608 / 4821
» Models in Information Retrieval
Sort
View
144
Voted
CORR
2010
Springer
184views Education» more  CORR 2010»
15 years 3 months ago
Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
We consider a Gaussian two-hop network where the source and the destination can communicate only via a relay node who is both an eavesdropper and a Byzantine adversary. Both the s...
Xiang He, Aylin Yener
NAR
2008
122views more  NAR 2008»
15 years 2 months ago
PlantTFDB: a comprehensive plant transcription factor database
Transcription factors (TFs) play key roles in controlling gene expression. Systematic identification and annotation of TFs, followed by construction of TF databases may serve as u...
Anyuan Guo, Xin Chen, Ge Gao, He Zhang, Qihui Zhu,...
125
Voted
PVLDB
2008
81views more  PVLDB 2008»
15 years 2 months ago
Optimization of multi-domain queries on the web
Where can I attend an interesting database workshop close to a sunny beach? Who are the strongest experts on service computing based upon their recent publication record and accep...
Daniele Braga, Stefano Ceri, Florian Daniel, David...
126
Voted
CIKM
2010
Springer
15 years 2 months ago
Mining interesting link formation rules in social networks
Link structures are important patterns one looks out for when modeling and analyzing social networks. In this paper, we propose the task of mining interesting Link Formation rules...
Cane Wing-ki Leung, Ee-Peng Lim, David Lo, Jianshu...
136
Voted
JCS
2010
135views more  JCS 2010»
15 years 1 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
« Prev « First page 4608 / 4821 Last » Next »