Sciweavers

1897 search results - page 234 / 380
» eg 2007
Sort
View
CHES
2007
Springer
111views Cryptology» more  CHES 2007»
14 years 3 months ago
TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks
Replay attacks are often the most costly attacks to thwart when dealing with off-chip memory integrity. With a trusted System-on-Chip, the existing countermeasures against replay r...
Reouven Elbaz, David Champagne, Ruby B. Lee, Lione...
CIA
2007
Springer
14 years 3 months ago
Trust Modeling with Context Representation and Generalized Identities
Abstract. We present a trust model extension that attempts to relax the assumptions that are currently taken by the majority of existing trust models: (i) proven identity of agents...
Martin Rehák, Michal Pechoucek
CIKM
2007
Springer
14 years 3 months ago
Autonomously semantifying wikipedia
Berners-Lee’s compelling vision of a Semantic Web is hindered by a chicken-and-egg problem, which can be best solved by a bootstrapping method — creating enough structured dat...
Fei Wu, Daniel S. Weld
CIKM
2007
Springer
14 years 3 months ago
Utilizing a geometry of context for enhanced implicit feedback
Implicit feedback algorithms utilize interaction between searchers and search systems to learn more about users’ needs and interests than expressed in query statements alone. Th...
Massimo Melucci, Ryen W. White
CIKM
2007
Springer
14 years 3 months ago
The role of documents vs. queries in extracting class attributes from text
Challenging the implicit reliance on document collections, this paper discusses the pros and cons of using query logs rather than document collections, as self-contained sources o...
Marius Pasca, Benjamin Van Durme, Nikesh Garera