Sciweavers

1544 search results - page 215 / 309
» The Process of Adoption
Sort
View
SEMWEB
2005
Springer
15 years 9 months ago
Provenance-Based Validation of E-Science Experiments
E-science experiments typically involve many distributed services maintained by different organisations. After an experiment has been executed, it is useful for a scientist to ver...
Sylvia C. Wong, Simon Miles, Weijian Fang, Paul T....
WS
2004
ACM
15 years 9 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
CIKM
2004
Springer
15 years 9 months ago
Providing consistent and exhaustive relevance assessments for XML retrieval evaluation
Comparing retrieval approaches requires test collections, which consist of documents, queries and relevance assessments. Obtaining consistent and exhaustive relevance assessments ...
Benjamin Piwowarski, Mounia Lalmas
ICWL
2004
Springer
15 years 9 months ago
CUBES: Providing Flexible Learning Environment for Virtual Universities
Abstract. To enable an online virtual university, a learning environment covering the entire spectrum of the learning and management process is required. However, constructing such...
Peifeng Xiang, Yuanchun Shi, Weijun Qin, Xin Xiang
142
Voted
IWDW
2004
Springer
15 years 9 months ago
Watermarking Attack: Security of WSS Techniques
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is studied here in adopting a cryptanalysis point of view. The security is proport...
François Cayre, Caroline Fontaine, Teddy Fu...