Sciweavers

469 search results - page 83 / 94
» Using Secret Sharing for Searching in Encrypted Data
Sort
View
IWDC
2005
Springer
117views Communications» more  IWDC 2005»
14 years 1 months ago
Oasis: A Hierarchical EMST Based P2P Network
Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems and ...
Pankaj Ghanshani, Tarun Bansal
ASPDAC
2005
ACM
119views Hardware» more  ASPDAC 2005»
13 years 9 months ago
CMP aware shuttle mask floorplanning
- By putting different chips on the same mask, shuttle mask (or multiple project wafer) provides an economical solution for low volume designs and design prototypes to share the ri...
Gang Xu, Ruiqi Tian, David Z. Pan, Martin D. F. Wo...
ECAI
2008
Springer
13 years 9 months ago
A probabilistic trust model for semantic peer-to-peer systems
Semantic peer to peer (P2P) systems are fully decentralized overlay networks of people or machines (called peers) sharing and searching varied resources (documents, videos, photos...
Gia Hien Nguyen, Philippe Chatalic, Marie-Christin...
CLEF
2009
Springer
13 years 8 months ago
A Trainable Multi-factored QA System
This paper reports on the construction and testing of a new Question Answering (QA) system, implemented as an workflow which builds on several web services developed at the Resear...
Radu Ion, Dan Stefanescu, Alexandru Ceausu, Dan Tu...
SIGIR
2008
ACM
13 years 7 months ago
To tag or not to tag -: harvesting adjacent metadata in large-scale tagging systems
We present HAMLET, a suite of principles, scoring models and algorithms to automatically propagate metadata along edges in a document neighborhood. As a showcase scenario we consi...
Adriana Budura, Sebastian Michel, Philippe Cudr&ea...