RENAL 发表于 2025-3-25 06:47:17

http://reply.papertrans.cn/27/2633/263250/263250_21.png

breadth 发表于 2025-3-25 09:51:23

http://reply.papertrans.cn/27/2633/263250/263250_22.png

1FAWN 发表于 2025-3-25 14:43:37

Tianyu Yan,Zifu Wan,Pingping Zhang (IR) and text mining methods focus on term-based approach, but suffers from the problems of terms variation such as polysemy and synonymy. This problem deteriorates when such methods are applied on Twitter due to the length limit. Over the years, people have held the hypothesis that pattern-based m

完全 发表于 2025-3-25 17:11:54

Lecture Notes in Computer Sciencecy is very high. Although this two-phase mechanism has a limitation to parameter setting, we show that the limitation does not prevent the mix network from being employed in its main application, e-voting, with the help of a grouped shuffling mechanism. Its achievement of desired security properties

Commonwealth 发表于 2025-3-25 21:28:13

Lei Wang,Juergen Gall,Rama Chellappa to explore the unknown part of the encryption algorithms. The existing SCAs for reverse engineering depend on the leakage models in a large extent and mainly focus on the single component of the algorithms while the other parts of the target algorithm are known. In this paper, we present a more gen

钩针织物 发表于 2025-3-26 03:25:12

http://reply.papertrans.cn/27/2633/263250/263250_26.png

几何学家 发表于 2025-3-26 05:13:50

http://reply.papertrans.cn/27/2633/263250/263250_27.png

dainty 发表于 2025-3-26 11:28:20

Nautilus: A Generic Framework for Crawling Deep Web of integrating heterogeneous business modules. A Federal Decentralized Architecture is proposed to ensemble advantages of existed P2P networking architectures. We also present effective policies to schedule crawling tasks. Experimental results show our scheduling policies have good performance on load-balance and overall throughput.

使长胖 发表于 2025-3-26 14:23:19

A Secure and Efficient Mix Network Especially Suitable for E-Votingcy is very high. Although this two-phase mechanism has a limitation to parameter setting, we show that the limitation does not prevent the mix network from being employed in its main application, e-voting, with the help of a grouped shuffling mechanism. Its achievement of desired security properties is formally proved.

Expressly 发表于 2025-3-26 18:34:24

http://reply.papertrans.cn/27/2633/263250/263250_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Data and Knowledge Engineering; Third International Yang Xiang,Mukaddim Pathan,Hua Wang Conference proceedings 2012 Springer-Verlag Berlin