Sciweavers

117 search results - page 17 / 24
» Why Cryptosystems Fail
Sort
View
ACL
2012
11 years 10 months ago
Tense and Aspect Error Correction for ESL Learners Using Global Context
As the number of learners of English is constantly growing, automatic error correction of ESL learners’ writing is an increasingly active area of research. However, most researc...
Toshikazu Tajiri, Mamoru Komachi, Yuji Matsumoto
USENIX
2007
13 years 10 months ago
POTSHARDS: Secure Long-Term Storage Without Encryption
Users are storing ever-increasing amounts of information digitally, driven by many factors including government regulations and the public’s desire to digitally record their per...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller,...
JKM
2007
123views more  JKM 2007»
13 years 8 months ago
Knowledge sharing: moving away from the obsession with best practices
Purpose – How companies can become better at knowing what they know, and share what they know have in recent years become dominant fields of research within knowledge managemen...
Peter Holdt Christensen
WS
2003
ACM
14 years 1 months ago
Rushing attacks and defense in wireless ad hoc network routing protocols
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many ...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
DAM
1999
100views more  DAM 1999»
13 years 8 months ago
Complexity Analysis of Propositional Resolution with Autarky Pruning
An algorithm called Modoc", which has been introduced elsewhere, enhances propositional model elimination with autarky pruning, and other features. The model elimination meth...
Allen Van Gelder