Sciweavers

501 search results - page 22 / 101
» Redundancy and Diversity in Security
Sort
View
OOPSLA
1990
Springer
14 years 3 days ago
Mixin-based Inheritance
The diverse inheritance mechanisms provided by Smalltalk, Beta, and CLOS are interpreted as different uses of a single underlying construct. Smalltalk and Beta differ primarily in...
Gilad Bracha, William R. Cook
ICSOC
2009
Springer
14 years 20 days ago
End-to-End Security for Enterprise Mashups
Abstract. Mashups are gaining momentum as a means to develop situational Web applications by combining different resources (services, data feeds) and user interfaces. In enterpris...
Florian Rosenberg, Rania Khalaf, Matthew J. Duftle...
IEEEAMS
2003
IEEE
14 years 1 months ago
Rich and Scalable Peer-to-Peer Search with SHARK
SHARK is a novel concept and middleware service for search in peer-to-peer (P2P) networks. Rather than flooding a network like Gnutella or imposing numerical IDs on objects like d...
Jan Mischke, Burkhard Stiller
PAKDD
2010
ACM
179views Data Mining» more  PAKDD 2010»
14 years 25 days ago
Answer Diversification for Complex Question Answering on the Web
We present a novel graph ranking model to extract a diverse set of answers for complex questions via random walks over a negative-edge graph. We assign a negative sign to edge weig...
Palakorn Achananuparp, Xiaohua Hu, Tingting He, Ch...
ITIIS
2008
168views more  ITIIS 2008»
13 years 8 months ago
An Algorithm for Iterative Detection and Decoding MIMO-OFDM HARQ with Antenna Scheduling
In this paper, a multiple-input-multiple-output (MIMO) hybrid-automatic repeat request (HARQ) algorithm with antenna scheduling is proposed. It retransmits the packet using schedu...
KyooHyun Kim, SeungWon Kang, Manar Mohaisen, Kyung...