Sciweavers

632 search results - page 3 / 127
» Two Facets of Authentication
Sort
View
CIKM
2009
Springer
13 years 5 months ago
Probabilistic models of ranking novel documents for faceted topic retrieval
Traditional models of information retrieval assume documents are independently relevant. But when the goal is retrieving diverse or novel information about a topic, retrieval mode...
Ben Carterette, Praveen Chandar
IEEECIT
2010
IEEE
13 years 6 months ago
Enabling Use of Single Password over Multiple Servers in Two-Server Model
—The two-server model is quite promising for password based authentication, well suited for the setting of federated enterprises. However, none of the existing two-server passwor...
Yanjiang Yang, Feng Bao
PERCOM
2007
ACM
14 years 7 months ago
Cryptanalysis of Two Lightweight RFID Authentication Schemes
Benessa Defend, Kevin Fu, Ari Juels
DCG
2008
101views more  DCG 2008»
13 years 7 months ago
On the Hardness of Computing Intersection, Union and Minkowski Sum of Polytopes
For polytopes P1, P2 Rd we consider the intersection P1 P2, the convex hull of the union CH(P1 P2), and the Minkowski sum P1 + P2. For Minkowski sum we prove that enumerating t...
Hans Raj Tiwary
VLDB
2005
ACM
85views Database» more  VLDB 2005»
14 years 1 months ago
A Faceted Query Engine Applied to Archaeology
In this demonstration, we describe a system for storing and querying faceted hierarchies. We have developed a general faceted domain model and a query language for hierarchically ...
Kenneth A. Ross, Angel Janevski, Julia Stoyanovich