Sciweavers

432 search results - page 76 / 87
» Telling Our Stories
Sort
View
CCS
2003
ACM
14 years 3 months ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
FCT
2003
Springer
14 years 3 months ago
Graph Searching, Elimination Trees, and a Generalization of Bandwidth
The bandwidth minimization problem has a long history and a number of practical applications. In this paper we introduce a natural extension of bandwidth to partially ordered layo...
Fedor V. Fomin, Pinar Heggernes, Jan Arne Telle
ICIA
2007
14 years 19 days ago
Improving Intelligent Assistants for Desktop Activities
Tasks have been identified as playing an important role to knowledge workers as high-level units for organizing their information. TaskTracer is a task-aware desktop system that l...
Simone Stumpf, Margaret M. Burnett, Thomas G. Diet...
CLEF
2008
Springer
14 years 3 days ago
Overview of WebCLEF 2008
We describe the WebCLEF 2008 task. Similarly to the 2007 edition of WebCLEF, the 2008 edition implements a multilingual "information synthesis" task, where, for a given t...
Valentin Jijkoun, Maarten de Rijke
SIGIR
2008
ACM
13 years 10 months ago
Exploring traversal strategy for web forum crawling
In this paper, we study the problem of Web forum crawling. Web forum has now become an important data source of many Web applications; while forum crawling is still a challenging ...
Yida Wang, Jiang-Ming Yang, Wei Lai, Rui Cai, Lei ...