Sciweavers

53302 search results - page 10491 / 10661
» On the design of a
Sort
View
TON
2008
108views more  TON 2008»
13 years 10 months ago
Impact of denial of service attacks on ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc netw...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
CIKM
2010
Springer
13 years 9 months ago
Automatically suggesting topics for augmenting text documents
We present a method for automated topic suggestion. Given a plain-text input document, our algorithm produces a ranking of novel topics that could enrich the input document in a m...
Robert West, Doina Precup, Joelle Pineau
CIKM
2010
Springer
13 years 9 months ago
Using Wikipedia categories for compact representations of chemical documents
Today, Web pages are usually accessed using text search engines, whereas documents stored in the deep Web are accessed through domain-specific Web portals. These portals rely on e...
Benjamin Köhncke, Wolf-Tilo Balke
CIKM
2010
Springer
13 years 9 months ago
Preference query evaluation over expensive attributes
Most database systems allow query processing over attributes that are derived at query runtime (e.g., user-defined functions and remote data calls to web services), making them e...
Justin J. Levandoski, Mohamed F. Mokbel, Mohamed E...
CIKM
2010
Springer
13 years 9 months ago
CiteData: a new multi-faceted dataset for evaluating personalized search performance
Personalized search systems have evolved to utilize heterogeneous features including document hyperlinks, category labels in various taxonomies and social tags in addition to free...
Abhay Harpale, Yiming Yang, Siddharth Gopal, Daqin...
« Prev « First page 10491 / 10661 Last » Next »