Sciweavers

2116 search results - page 142 / 424
» Resource Analysis by Sup-interpretation
Sort
View
163
Voted
CCGRID
2004
IEEE
15 years 7 months ago
Search performance analysis and robust search algorithm in unstructured peer-to-peer networks
Recently Peer-to-Peer networks (P2P) have gained great attention and popularity. One key challenging aspect in a P2P resource sharing environment is an efficient searching algorit...
Tsungnan Lin, Hsinping Wang, Jianming Wang
FDL
2004
IEEE
15 years 7 months ago
UML System-Level Analysis and Design of Secure Communication Schemes for Embedded Systems
In this work we develop a secure communication protocol in the context of a Remote Meter Reading (RMR) System. We first analyze existing standards in secure communication (e.g. IP...
Mauro Prevostini, Giuseppe Piscopo, I. Stefanini
165
Voted
DAMON
2006
Springer
15 years 7 months ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...
144
Voted
DGO
2007
104views Education» more  DGO 2007»
15 years 5 months ago
Advancing return on investment analysis for government information technology
The Center for Technology in Government (CTG) in collaboration with SAP, the business software solutions provider to public sector organizations, conducted a research project focu...
Anthony M. Cresswell, Theresa A. Pardo, G. Brian B...
LREC
2010
234views Education» more  LREC 2010»
15 years 5 months ago
Building an Italian FrameNet through Semi-automatic Corpus Analysis
In this paper, we outline the methodology we adopted to develop a FrameNet for Italian. The main element of novelty with respect to the original FrameNet is represented by the fac...
Alessandro Lenci, Martina Johnson, Gabriella Lapes...