Sciweavers

1045 search results - page 135 / 209
» The Use of Exceptions
Sort
View
CAISE
2004
Springer
14 years 1 months ago
Enabling Personalized Composition and Adaptive Provisioning of Web Services
Abstract. The proliferation of interconnected computing devices is fostering the emergence of environments where Web services made available to mobile users are a commodity. Unfort...
Quan Z. Sheng, Boualem Benatallah, Zakaria Maamar,...
CLEF
2004
Springer
14 years 1 months ago
Application of Variable Length N-Gram Vectors to Monolingual and Bilingual Information Retrieval
Our group in the Department of Informatics at the University of Oviedo has participated, for the first time, in two tasks at CLEF: monolingual (Russian) and bilingual (Spanish-to-E...
Daniel Gayo-Avello, Darío Álvarez Gu...
INEX
2004
Springer
14 years 1 months ago
Mixture Models, Overlap, and Structural Hints in XML Element Retrieval
We describe the INEX 2004 participation of the Informatics Institute of the University of Amsterdam. We completely revamped our XML retrieval system, now implemented as a mixture l...
Börkur Sigurbjörnsson, Jaap Kamps, Maart...
OTM
2004
Springer
14 years 1 months ago
Managing Long Running Queries in Grid Environment
Exceptionally large amounts of both distributed data and computational resources are becoming available through the Grid. This will enable efficient exchange and processing of very...
Ruslan Fomkin, Tore Risch
TCC
2004
Springer
131views Cryptology» more  TCC 2004»
14 years 1 months ago
Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems
Recently Canetti, Krawczyk and Nielsen defined the notion of replayable adaptive chosen ciphertext attack (RCCA) secure encryption. Essentially a cryptosystem that is RCCA secure ...
Jens Groth