Sciweavers

1945 search results - page 160 / 389
» Survivable Information Storage Systems
Sort
View
131
Voted
JUCS
2008
113views more  JUCS 2008»
15 years 3 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
131
Voted
CLEF
2005
Springer
15 years 9 months ago
Overview of the CLEF 2005 Interactive Track
The CLEF Interactive Track (iCLEF) is devoted to the comparative study of userinclusive cross-language search strategies. In 2005, we have studied two cross-language search tasks:...
Julio Gonzalo, Paul Clough, Alessandro Vallin
122
Voted
SIGIR
2002
ACM
15 years 3 months ago
Detecting and Browsing Events in Unstructured text
Previews and overviews of large, heterogeneous information resources help users comprehend the scope of collections and focus on particular subsets of interest. For narrative docu...
David A. Smith
206
Voted
SIGMOD
2007
ACM
144views Database» more  SIGMOD 2007»
16 years 3 months ago
The TopX DB&IR engine
This paper proposes a demo of the TopX search engine, an extensive framework for unified indexing, querying, and ranking of large collections of unstructured, semistructured, and ...
Martin Theobald, Ralf Schenkel, Gerhard Weikum
150
Voted
ISMVL
2006
IEEE
99views Hardware» more  ISMVL 2006»
15 years 9 months ago
Signal Processing Algorithms and Multiple-Valued Logic Design Methods
Multiple-valued logic can be viewed as an alternative approach to solving many problems in transmission, storage, and processing of large and even increasing amounts of informatio...
Jaakko Astola, Radomir S. Stankovic